<< Prev Question Next Question >>

Question 3/36

A security professional discovers a new ransomware strain that disables antivirus on the endpoint during an infection. Which location would be the BEST place for the security professional to find technical information about this malware?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (36q)
Question 1: According to Payment Card Industry Data Security Standard (P...
Question 2: A security administrator notices a process running on their ...
Question 3: A security professional discovers a new ransomware strain th...
Question 4: During an incident, the following actions have been taken: -...
Question 5: After imaging a disk as part of an investigation, a forensic...
Question 6: A common formula used to calculate risk is: + Threats + Vuln...
Question 7: During which phase of a vulnerability assessment would a sec...
Question 8: A first responder notices a file with a large amount of clip...
Question 9: A government organization responsible for critical infrastru...
Question 10: The Key Reinstallation Attack (KRACK) vulnerability is speci...
Question 11: It was recently discovered that many of an organization's se...
Question 12: A system administrator identifies unusual network traffic fr...
Question 13: Which of the following is the GREATEST risk of having securi...
Question 14: An attacker intercepts a hash and compares it to pre-compute...
Question 15: As part of an organization's regular maintenance activities,...
Question 16: Which of the following, when exposed together, constitutes P...
Question 17: To minimize vulnerability, which steps should an organizatio...
Question 18: Which of the following could be useful to an organization th...
Question 19: An incident responder discovers that the CEO logged in from ...
Question 20: Which asset would be the MOST desirable for a financially mo...
Question 21: An incident responder was asked to analyze malicious traffic...
Question 22: When attempting to determine which system or user is generat...
Question 23: While planning a vulnerability assessment on a computer netw...
Question 24: Tcpdump is a tool that can be used to detect which of the fo...
Question 25: A company has noticed a trend of attackers gaining access to...
Question 26: An organization recently suffered a breach due to a human re...
Question 27: When tracing an attack to the point of origin, which of the ...
Question 28: Which of the following are common areas of vulnerabilities i...
Question 29: Which of the following would MOST likely make a Windows work...
Question 30: A security analyst is required to collect detailed network t...
Question 31: Which of the following are legally compliant forensics appli...
Question 32: Which of the following is an automated password cracking tec...
Question 33: Senior management has stated that antivirus software must be...
Question 34: Network infrastructure has been scanned and the identified i...
Question 35: Which of the following are part of the hardening phase of th...
Question 36: An incident handler is assigned to initiate an incident resp...