<< Prev Question Next Question >>

Question 110/233

Anne, the Chief Executive Officer (CEO), has reported that she is getting multiple telephone calls from someone claiming to be from the helpdesk. The caller is asking to verify her network authentication credentials because her computer is broadcasting across the network.
This is MOST likely which of the following types of attacks?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (233q)
Question 1: Which of the following should identify critical systems and ...
Question 2: A security administrator needs to address the following audi...
Question 3: The data backup window has expanded into the morning hours a...
Question 4: Which of the following AES modes of operation provide authen...
Question 5: A black hat hacker is enumerating a network and wants to rem...
Question 6: A security technician would like to obscure sensitive data w...
Question 7: A member of the admins group reports being unable to modify ...
Question 8: Which of the following components of printers and MFDs are M...
Question 9: A manager suspects that an IT employee with elevated databas...
Question 10: A security administrator has been assigned to review the sec...
Question 11: A business has recently deployed laptops to all sales employ...
Question 12: Which of the following should be used to implement voice enc...
Question 13: A security administrator is developing training for corporat...
Question 14: After attempting to harden a web server, a security analyst ...
Question 15: A web application is configured to target browsers and allow...
Question 16: An administrator is testing the collision resistance of diff...
Question 17: A network operations manager has added a second row of serve...
Question 18: A security analyst is testing both Windows and Linux systems...
Question 19: Which of the following describes the key difference between ...
Question 20: An attacker wearing a building maintenance uniform approache...
Question 21: A security technician has been receiving alerts from several...
Question 22: A network administrator wants to ensure that users do not co...
Question 23: A technician receives a device with the following anomalies:...
Question 24: A security analyst reviews the following output: (Exhibit) T...
Question 25: After an identified security breach, an analyst is tasked to...
Question 26: A security administrator must implement a system to ensure t...
Question 27: A security administrator has been tasked with improving the ...
Question 28: After a security incident, management is meeting with involv...
Question 29: Joe, a security administrator, needs to extend the organizat...
Question 30: A security manager is creating an account management policy ...
Question 31: A company hires a third-party firm to conduct an assessment ...
Question 32: To determine the ALE of a particular risk, which of the foll...
Question 33: A security engineer is configuring a wireless network with E...
Question 34: The Chief Technology Officer (CTO) of a company, Ann, is put...
Question 35: A systems administrator wants to generate a self-signed cert...
Question 36: A security guard has informed the Chief Information Security...
Question 37: A security team wants to establish an Incident Response plan...
Question 38: A director of IR is reviewing a report regarding several rec...
Question 39: A new intern in the purchasing department requires read acce...
Question 40: A company was recently audited by a third party. The audit r...
Question 41: Joe, the security administrator, sees this in a vulnerabilit...
Question 42: A security administrator is diagnosing a server where the CP...
Question 43: Which of the following technologies would be MOST appropriat...
Question 44: An administrator discovers the following log entry on a serv...
Question 45: During a data breach cleanup, it is discovered that not all ...
Question 46: A security analyst is updating a BIA document. The security ...
Question 47: Phishing emails frequently take advantage of high-profile ca...
Question 48: Which of the following use the SSH protocol?...
Question 49: An employee receives an email, which appears to be from the ...
Question 50: A company's AUP requires: Passwords must meet complexity req...
Question 51: Ann is the IS manager for several new systems in which the c...
Question 52: Which of the following cryptographic algorithms is irreversi...
Question 53: A technician suspects that a system has been compromised. Th...
Question 54: The chief security officer (CS0) has issued a new policy tha...
Question 55: An organization has hired a penetration tester to test the s...
Question 56: A systems administrator is reviewing the following informati...
Question 57: During an application design, the development team specifics...
Question 58: An organization recently moved its custom web applications t...
Question 59: Joe, a user, wants to send Ann, another user, a confidential...
Question 60: A system administrator is configuring a site-to-site VPN tun...
Question 61: An incident involving a workstation that is potentially infe...
Question 62: Attackers have been using revoked certificates for MITM atta...
Question 63: An employee uses RDP to connect back to the office network. ...
Question 64: Which of the following would verify that a threat does exist...
Question 65: An organization is moving its human resources system to a cl...
Question 66: Company A agrees to provide perimeter protection, power, and...
Question 67: While reviewing the monthly internet usage it is noted that ...
Question 68: A computer on a company network was infected with a zero-day...
Question 69: After a merger, it was determined that several individuals c...
Question 70: An in-house penetration tester is using a packet capture dev...
Question 71: Although a web enabled application appears to only allow let...
Question 72: A third-party penetration testing company was able to succes...
Question 73: When it comes to cloud computing, if one of the requirements...
Question 74: A company is allowing a BYOD policy for its staff. Which of ...
Question 75: An organization wants to utilize a common, Internet-based th...
1 commentQuestion 76: A systems administrator wants to protect data stored on mobi...
Question 77: A penetration tester is conducting an assessment on Comptia....
Question 78: A user downloads and installs an MP3 converter, and runs the...
Question 79: A security engineer is faced with competing requirements fro...
Question 80: An in-house penetration tester has been asked to evade a new...
Question 81: A technician must configure a firewall to block external DNS...
Question 82: Following the successful response to a data-leakage incident...
Question 83: Having adequate lighting on the outside of a building is an ...
Question 84: A user typically works remotely over the holidays using a we...
Question 85: An audit takes place after company-wide restricting, in whic...
Question 86: New magnetic locks were ordered for an entire building. In a...
Question 87: An attacker exploited a vulnerability on a mail server using...
Question 88: An organization identifies a number of hosts making outbound...
Question 89: As part of the SDLC, a third party is hired to perform a pen...
Question 90: A bank requires tellers to get manager approval when a custo...
Question 91: A security analyst notices anomalous activity coming from se...
Question 92: A workstation puts out a network request to locate another s...
Question 93: Ann a security analyst is monitoring the IDS console and not...
Question 94: An actor downloads and runs a program against a corporate lo...
Question 95: A company wants to host a publicly available server that per...
Question 96: Which of the following is the BEST choice for a security con...
Question 97: A forensic investigator has run into difficulty recovering u...
Question 98: During a routine vulnerability assessment, the following com...
Question 99: Technicians working with servers hosted at the company's dat...
Question 100: Which of the following are the MAIN reasons why a systems ad...
Question 101: A hacker has a packet capture that contains: (Exhibit) Which...
Question 102: A security analyst has received the following alert snippet ...
Question 103: An organization's primary datacenter is experiencing a two-d...
Question 104: During a monthly vulnerability scan, a server was flagged fo...
Question 105: The Chief Information Security Officer (CISO) is asking for ...
Question 106: Which of the following vulnerability types would the type of...
Question 107: A security administrator needs to implement a system that de...
Question 108: A company offers SaaS, maintaining all customers' credential...
Question 109: An organization plans to implement multifactor authenticatio...
Question 110: Anne, the Chief Executive Officer (CEO), has reported that s...
Question 111: An administrator is configuring access to information locate...
Question 112: Recently several employees were victims of a phishing email ...
Question 113: A user is presented with the following items during the new-...
Question 114: After a routine audit, a company discovers that engineering ...
Question 115: A penetration tester finds that a company's login credential...
Question 116: A security analyst has been asked to perform a review of an ...
Question 117: A software developer wants to ensure that the application is...
Question 118: The POODLE attack is an MITM exploit that affects:...
Question 119: An organization requires users to provide their fingerprints...
Question 120: A security analyst wants to harden the company's VoIP PBX. T...
Question 121: A new mobile application is being developed in-house. Securi...
Question 122: Which of the following differentiates a collision attack fro...
Question 123: A Chief Executive Officer (CEO) suspects someone in the lab ...
Question 124: A security analyst is acquiring data from a potential networ...
Question 125: Joe, a technician, is working remotely with his company prov...
Question 126: A security administrator returning from a short vacation rec...
Question 127: A security administrator learns that PII, which was gathered...
Question 128: Which of the following works by implanting software on syste...
Question 129: As part of a new BYOD rollout, a security analyst has been a...
Question 130: Which of the following are used to increase the computing ti...
Question 131: A Security Officer on a military base needs to encrypt sever...
Question 132: An auditor has identified an access control system that can ...
Question 133: A development team has adopted a new approach to projects in...
Question 134: A Chief Information Officer (CIO) drafts an agreement betwee...
Question 135: A chief Financial Officer (CFO) has asked the Chief Informat...
Question 136: A security administrator is configuring a new network segmen...
Question 137: Before an infection was detected, several of the infected de...
Question 138: Which of the following attack types is being carried out whe...
Question 139: A web server, which is configured to use TLS with AES-GCM-25...
Question 140: A security analyst receives an alert from a WAF with the fol...
Question 141: An organization is comparing and contrasting migration from ...
Question 142: Which of the following is the summary of loss for a given ye...
Question 143: A security analyst is attempting to break into a client's se...
Question 144: A group of non-profit agencies wants to implement a cloud se...
Question 145: The Chief Security Officer (CISO) at a multinational banking...
Question 146: Upon entering an incorrect password, the logon screen displa...
Question 147: An organization uses SSO authentication for employee access ...
Question 148: A company wants to ensure that the validity of publicly trus...
Question 149: A technician has installed new vulnerability scanner softwar...
Question 150: Audit logs from a small company's vulnerability scanning sof...
Question 151: A penetration testing is preparing for a client engagement i...
Question 152: During a recent audit, it was discovered that several user a...
Question 153: Which of the following best describes the initial processing...
Question 154: A security administrator is creating a subnet on one of the ...
Question 155: A system administrator needs to implement 802.1x whereby whe...
Question 156: A mobile device user is concerned about geographic positioni...
Question 157: An administrator has concerns regarding the traveling sales ...
Question 158: A security administrator has written a script that will auto...
Question 159: A system's administrator has finished configuring firewall A...
Question 160: A company exchanges information with a business partner. An ...
Question 161: Which of the following is commonly done as part of a vulnera...
Question 162: Which of the following is the BEST reason to run an untested...
Question 163: A copy of a highly confidential salary report was recently f...
Question 164: A vice president at a manufacturing organization is concerne...
Question 165: To reduce disk consumption, an organization's legal departme...
Question 166: After a recent internal breach, a company decided to regener...
Question 167: The availability of a system has been labeled as the highest...
Question 168: A security administrator receives notice that a third-party ...
Question 169: Which of the following types of attacks precedes the install...
Question 170: A security analyst is inspecting the results of a recent int...
Question 171: An organization relies heavily on an application that has a ...
Question 172: A security analyst conducts a manual scan on a known hardene...
Question 173: Which of the following is used to validate the integrity of ...
Question 174: Which of the following is the proper way to quantify the tot...
Question 175: Ann, a security administrator, wants to ensure credentials a...
Question 176: The chief Security Officer (CSO) has reported a rise in data...
Question 177: An administrator intends to configure an IPSec solution that...
Question 178: Which of the following is the GREATEST risk to a company by ...
Question 179: A software development company needs to share information be...
Question 180: A user of the wireless network is unable to gain access to t...
Question 181: A network administrator is attempting to troubleshoot an iss...
Question 182: A security administrator suspects a MITM attack aimed at imp...
Question 183: The IT department is deploying new computers. To ease the tr...
Question 184: A dumpster diver recovers several hard drives from a company...
Question 185: A security analyst is performing a quantitative risk analysi...
Question 186: A new firewall has been places into service at an organizati...
Question 187: Which of the following precautions MINIMIZES the risk from n...
Question 188: An information security analyst needs to work with an employ...
Question 189: A company is deploying smartphones for its mobile salesforce...
Question 190: An application developer is designing an application involvi...
Question 191: A web developer improves client access to the company's REST...
Question 192: An attacker uses a network sniffer to capture the packets of...
Question 193: A company has a security policy that specifies all endpoint ...
Question 194: After a merger between two companies a security analyst has ...
Question 195: A security administrator is trying to encrypt communication....
Question 196: A technician is configuring a wireless guest network. After ...
Question 197: A software development manager is taking over an existing so...
Question 198: A supervisor in your organization was demoted on Friday afte...
Question 199: Company policy requires the use if passphrases instead if pa...
Question 200: Which of the following would meet the requirements for multi...
Question 201: A user needs to send sensitive information to a colleague us...
Question 202: A security analyst accesses corporate web pages and inputs r...
Question 203: Which of the following is the LEAST secure hashing algorithm...
Question 204: A network technician is setting up a segmented network that ...
Question 205: Joe is exchanging encrypted email with another party. Joe en...
Question 206: Which of the following should a security analyst perform FIR...
Question 207: A security architect has convened a meeting to discuss an or...
Question 208: A penetration tester harvests potential usernames from a soc...
Question 209: During a routine audit, it is discovered that someone has be...
Question 210: A company is evaluating cloud providers to reduce the cost o...
Question 211: An organization has several production-critical SCADA superv...
Question 212: A security analyst is securing smartphones and laptops for a...
Question 213: Which of the following controls allows a security guard to p...
Question 214: A help desk is troubleshooting user reports that the corpora...
Question 215: Which of the following could help detect trespassers in a se...
Question 216: The SSID broadcast for a wireless router has been disabled b...
Question 217: Legal authorities notify a company that its network has been...
Question 218: A vulnerability scan is being conducted against a desktop sy...
Question 219: A security program manager wants to actively test the securi...
Question 220: Users in a corporation currently authenticate with a usernam...
Question 221: The security administrator receives an email on a non-compan...
Question 222: A small company's Chief Executive Officer (CEO) has asked it...
Question 223: A cybersecurity analyst is looking into the payload of a ran...
Question 224: A security engineer is configuring a wireless network that m...
Question 225: A company is developing a new system that will unlock a comp...
Question 226: A security analyst is investigating a suspected security bre...
Question 227: An attacker discovers a new vulnerability in an enterprise a...
Question 228: A systems administrator is attempting to recover from a cata...
Question 229: Which of the following could occur when both strong and weak...
Question 230: A member of a digital forensics team, Joe arrives at a crime...
Question 231: A company researched the root cause of a recent vulnerabilit...
Question 232: A security administrator is tasked with conducting an assess...
Question 233: Which of the following are methods to implement HA in a web ...