<< Prev Question Next Question >>

Question 15/59

Eric is receiving complaints from employees that their systems are very slow and experiencing odd issues including restarting automatically and frequent system hangs. Upon investigating, he is convinced the systems are infected with a virus that forces systems to shut down automatically after period of time. What type of security incident are the employees a victim of?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (59q)
Question 1: Identify the network topology where each computer acts as a ...
1 commentQuestion 2: Syslog and SNMP are the two main _______ protocols through w...
1 commentQuestion 3: Which of the following statement holds true in terms of cont...
Question 4: ------------is a group of broadband wireless communications ...
Question 5: Which IEEE standard does wireless network use?...
Question 6: The bank where you work has 600 windows computers and 400 Re...
Question 7: John has successfully remediated the vulnerability of an int...
Question 8: Management asked their network administrator to suggest an a...
Question 9: In MacOS, how can the user implement disk encryption?...
Question 10: As a network administrator, you have implemented WPA2 encryp...
Question 11: Management wants to bring their organization into compliance...
Question 12: How is application whitelisting different from application b...
Question 13: Will is working as a Network Administrator. Management wants...
Question 14: George was conducting a recovery drill test as a part of his...
Question 15: Eric is receiving complaints from employees that their syste...
Question 16: Based on which of the following registry key, the Windows Ev...
Question 17: Frank is a network technician working for a medium-sized law...
1 commentQuestion 18: Identify the virtualization level that creates a massive poo...
Question 19: Kyle is an IT consultant working on a contract for a large e...
Question 20: Which among the following is used to limit the number of cmd...
Question 21: Which VPN QoS model guarantees the traffic from one customer...
Question 22: Liza was told by her network administrator that they will be...
Question 23: Justine has been tasked by her supervisor to ensure that the...
Question 24: John, the network administrator and he wants to enable the N...
Question 25: Which of the following is an example of MAC model?...
Question 26: A VPN Concentrator acts as a bidirectional tunnel endpoint a...
Question 27: Management decides to implement a risk management system to ...
Question 28: Which of the following VPN topologies establishes a persiste...
Question 29: During a security awareness program, management was explaini...
Question 30: Which of the following helps in viewing account activity and...
Question 31: If Myron, head of network defense at Cyberdyne, wants to cha...
Question 32: Katie has implemented the RAID level that split data into bl...
Question 33: Which of the following indicators refers to potential risk e...
Question 34: Fred is a network technician working for Johnson Services, a...
Question 35: The IR team and the network administrator have successfully ...
1 commentQuestion 36: Which of the following things need to be identified during a...
Question 37: If there is a fire incident caused by an electrical applianc...
Question 38: Assume that you are a network administrator and the company ...
Question 39: Which of the following helps prevent executing untrusted or ...
Question 40: Malone is finishing up his incident handling plan for IT bef...
2 commentQuestion 41: Phishing-like attempts that present users a fake usage bill ...
Question 42: Which of the following can be used to disallow a system/user...
Question 43: A network administrator is monitoring the network traffic wi...
Question 44: Which type of firewall consists of three interfaces and allo...
Question 45: Which OSI layer does a Network Interface Card (NIC) work on?...
Question 46: Harry has sued the company claiming they made his personal i...
Question 47: Disaster Recovery is a _________....
Question 48: Dan and Alex are business partners working together. Their B...
Question 49: Identify the correct statements regarding a DMZ zone:...
Question 50: How can a WAF validate traffic before it reaches a web appli...
Question 51: Who is an IR custodian?
Question 52: Tom works as a network administrator in a multinational orga...
Question 53: John is working as a network defender at a well-reputed mult...
Question 54: An enterprise recently moved to a new office and the new nei...
Question 55: In ______ method, event logs are arranged in the form of a c...
Question 56: Ross manages 30 employees and only 25 computers in the organ...
Question 57: A company has the right to monitor the activities of their e...
Question 58: Which among the following filter is used to detect a SYN/FIN...
Question 59: The risk assessment team in Southern California has estimate...