<< Prev Question Next Question >>

Question 30/132

A company's help desk received several AV alerts indicating Mimikatz attempted to run on the remote systems. Several users also reported that the new company flash drives they picked up in the break room only have 512KB of storage. Which of the following is MOST likely the cause?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (132q)
Question 1: A security engineer is reviewing log files after a third dis...
Question 2: A smart switch has the ability to monitor electrical levels ...
Question 3: A technician needs to prevent data loss in a laboratory. The...
Question 4: Which of the following BEST describes the MFA attribute that...
Question 5: The IT department's on-site developer has been with the team...
Question 6: Which of the following scenarios would make a DNS sinkhole e...
Question 7: A company has drafted an insider-threat policy that prohibit...
Question 8: The following is an administrative control that would be MOS...
Question 9: An organization routes all of its traffic through a VPN Most...
Question 10: A security analyst is looking for a solution to help communi...
Question 11: Several employees return to work the day after attending an ...
Question 12: A security analyst is investigating a vulnerability in which...
Question 13: An attacker was easily able to log in to a company's securit...
Question 14: An engineer is setting up a VDI environment for a factory lo...
Question 15: A cybersecurity analyst needs to implement secure authentica...
Question 16: An end user reports a computer has been acting slower than n...
Question 17: Which of the following is MOST likely to contain ranked and ...
Question 18: A database administrator needs to ensure all passwords are s...
Question 19: In which of the following common use cases would steganograp...
Question 20: An organization is concerned that its hosted web servers are...
Question 21: A small company that does not have security staff wants to i...
Question 22: Which of the following allows for functional test data to be...
Question 23: Which of the following would MOST likely support the integri...
Question 24: A security analyst has been asked to investigate a situation...
Question 25: A security administrator is analyzing the corporate wireless...
Question 26: A company recently added a DR site and is redesigning the ne...
Question 27: n organization plans to transition the intrusion detection a...
Question 28: Which of the following would be BEST to establish between or...
Question 29: A technician needs to prevent data loss in a laboratory. The...
Question 30: A company's help desk received several AV alerts indicating ...
Question 31: A network engineer needs to create a plan for upgrading the ...
Question 32: An organization that is located in a flood zone is MOST like...
Question 33: A user contacts the help desk to report the following: * Two...
Question 34: A customer called a company's security team to report that a...
Question 35: An organization is concerned that is hosted web servers are ...
Question 36: A security analyst has been reading about a newly discovered...
Question 37: A cybersecurity analyst reviews the log files from a web ser...
Question 38: An organization wants to implement a third factor to an exis...
Question 39: A company recently experienced a data breach and the source ...
Question 40: After reading a security bulletin, a network security manage...
Question 41: Which of the following is MOST likely to outline the roles a...
Question 42: When used at the design stage, which of the following improv...
Question 43: A security engineer needs to implement an MDM solution that ...
Question 44: A network manager is concerned that business may be negative...
Question 45: Which of the following refers to applications and systems th...
Question 46: Which of the following would be the BEST resource lor a soft...
Question 47: A security engineer is installing a WAF to protect the compa...
Question 48: An organization just experienced a major cyberattack modem. ...
Question 49: A RAT that was used to compromise an organization's banking ...
Question 50: When selecting a technical solution for identity management,...
Question 51: A global company is experiencing unauthorized logging due to...
Question 52: A network administrator needs to build out a new datacenter,...
Question 53: Users have been issued smart cards that provide physical acc...
Question 54: A systems administrator needs to install a new wireless netw...
Question 55: A university with remote campuses, which all use different s...
Question 56: A security analyst is performing a forensic investigation co...
Question 57: Entering a secure area requires passing through two doors, b...
Question 58: An end user reports a computer has been acting slower than n...
Question 59: After entering a username and password, and administrator mu...
Question 60: A company is launching a new internet platform for its clien...
Question 61: Which of the following ISO standards is certified for privac...
Question 62: A security analyst needs to be proactive in understand the t...
Question 63: Company engineers regularly participate in a public Internet...
Question 64: During an incident response, a security analyst observes the...
Question 65: A nationwide company is experiencing unauthorized logins at ...
Question 66: In which of the following risk management strategies would c...
Question 67: While reviewing the wireless router, the systems administrat...
Question 68: A well-known organization has been experiencing attacks from...
Question 69: An analyst visits an internet forum looking for information ...
Question 70: An attacker is attempting, to harvest user credentials on a ...
Question 71: Which of the following types of controls is a CCTV camera th...
Question 72: A manufacturer creates designs for very high security produc...
Question 73: Which of the following utilize a subset of real data and are...
Question 74: A multinational organization that offers web-based services ...
Question 75: A network administrator at a large organization Is reviewing...
Question 76: A critical file server is being upgraded and the systems adm...
Question 77: Joe, a user at a company, clicked an email link led to a web...
Question 78: A systems analyst is responsible for generating a new digita...
Question 79: The manager who is responsible for a data set has asked a se...
Question 80: A security analyst is reviewing the following command-line o...
Question 81: An organization has been experiencing outages during holiday...
Question 82: A security analyst is running a vulnerability scan to check ...
Question 83: An engineer wants to access sensitive data from a corporate-...
Question 84: An organization has a growing workforce that is mostly drive...
Question 85: A document that appears to be malicious has been discovered ...
Question 86: An.. that has a large number of mobile devices is exploring ...
Question 87: Which of the following would BEST identify and remediate a d...
Question 88: A company's Chief Information Security Officer (CISO) recent...
Question 89: A security analyst receives a SIEM alert that someone logged...
Question 90: A smart retail business has a local store and a newly establ...
Question 91: Which of the following incident response steps involves acti...
Question 92: An employee has been charged with fraud and is suspected of ...
Question 93: A cybersecurity department purchased o new PAM solution. The...
Question 94: A Chief Security Officer (CSO) is concerned about the volume...
Question 95: The Chief Security Officer (CSO) at a major hospital wants t...
Question 96: An organization has expanded its operations by opening a rem...
Question 97: Which of the following would cause a Chief Information Secur...
Question 98: A company provides mobile devices to its users to permit acc...
Question 99: A user enters a password to log in to a workstation and is t...
Question 100: Which of the following will MOST likely adversely impact the...
Question 101: A network engineer is troubleshooting wireless network conne...
Question 102: An organization hired a consultant to assist with an active ...
Question 103: A security architect at a large, multinational organization ...
Question 104: A security operations analyst is using the company's SIEM so...
Question 105: A software developer needs to perform code-execution testing...
Question 106: Which of the following policies would help an organization i...
Question 107: A security administrator checks the table of a network switc...
Question 108: A SOC is implementing an in sider-threat-detection program. ...
Question 109: A company has been experiencing very brief power outages fro...
Question 110: A small business office is setting up a wireless infrastruct...
Question 111: An auditor is performing an assessment of a security applian...
Question 112: A recently discovered zero-day exploit utilizes an unknown v...
Question 113: A security analyst is investigation an incident that was fir...
Question 114: The cost of 'movable media and the security risks of transpo...
Question 115: The spread of misinformation surrounding the outbreak of a n...
Question 116: A security analyst Is hardening a Linux workstation and must...
Question 117: Which of the following types of controls is a turnstile?...
Question 118: A SOC is implementing an in sider-threat-detection program. ...
Question 119: A small business just recovered from a ransomware attack aga...
Question 120: A security analyst needs to generate a server certificate to...
Question 121: A startup company is using multiple SaaS and IaaS platforms ...
Question 122: A company is designing the layout of a new datacenter so it ...
Question 123: Some laptops recently went missing from a locked storage are...
Question 124: A company is upgrading its wireless infrastructure to WPA2-E...
Question 125: Which of the following is the purpose of a risk register?...
Question 126: Which of the following BEST explains the difference between ...
Question 127: A security administrator has noticed unusual activity occurr...
Question 128: A recent audit uncovered a key finding regarding the use of ...
1 commentQuestion 129: A bank detects fraudulent activity on user's account. The us...
Question 130: A security analyst is reviewing the following output from a ...
Question 131: A vulnerability assessment report will include the CVSS scor...
Question 132: An analyst is trying to identify insecure services that are ...