Exam 8: Security Strategies and Documentation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.   What type of malware is on your computer?

(Multiple Choice)
4.8/5
(34)

Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence. ​ What must Jacob maintain so the evidence can be used to prosecute the crime?

(Multiple Choice)
4.8/5
(46)

When working with a security consultant that your company has hired, you notice that he is running software on one of the machines. He explains that the program is running a brute force attack that is using every word in the English language to see if the Administrator password can be cracked.   What type of attack is he attempting?

(Multiple Choice)
4.9/5
(43)

Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor causes the change to fail.   What is Becky's mistake called?

(Multiple Choice)
4.9/5
(37)

Currently James's company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. ​ What will James recommend as an upgrade to RADIUS?

(Multiple Choice)
4.8/5
(47)

Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client's desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When Lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When Lane arrived, she checked to see how much free space the computer had available and found that it had 250GB less than the day before.   What is the issue with the client's computer?

(Multiple Choice)
4.8/5
(28)

Peggy found a freely distributed software package for her small business that will allow its sales to be tracked into a database for inventory purposes. ​ Can Peggy install this software on all the computers in her store?

(Multiple Choice)
4.8/5
(37)

Nick works for a software development company that has just created a new application that will revolutionize the computer security industry. Nick's company owns the patent for the software and has a copyright for the software. The company would like to sell this new software but they are concerned about someone pirating the software. ​ What can Nick's company use to prevent software piracy?

(Multiple Choice)
4.9/5
(30)

Larry has participated in a change proposal for his company. During the planning stage, Larry was told that his role in the change would be small but important. In the implementation stage, Larry completed his task according to the stipulations and timeframe of the plan. However, Larry was called in five times during the change to help others complete the change process. ​ Where in the change management process did the problem occur?

(Multiple Choice)
4.8/5
(34)

One of your clients at work calls and is irate because he had to change his password and now he can't seem to find one that will match the strength needed for the company server. After he finishes venting, you tell him you will send him the document that explains why he needs to have a strong password.   What document will you send the client?

(Multiple Choice)
4.8/5
(36)

Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network. ​ What type of service is Jennifer's company using?

(Multiple Choice)
4.9/5
(40)

During an upgrade for a new web server, Glen's company experienced a power surge. The power surge hit the new server, and now the company must troubleshoot the server. ​ What can the company implement that will get the website up and running without the new server?

(Multiple Choice)
4.8/5
(40)

Your company has decided that security is very important and wants to add a second security check when workers are logging in to their computers. The company issued key fobs to all the employees. The key fob generates a code for them to enter when logging in to the computer. ​ What type of security is your company using?

(Multiple Choice)
4.8/5
(39)

If you are working on a client's computer and you believe that you have found a violation of the AUP, what is your next step?

(Multiple Choice)
4.9/5
(39)

Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer.   What should she do before she runs the anti-malware program?

(Multiple Choice)
4.8/5
(40)

Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore.   What does Victoria need to do to run the antivirus software on System Restore?

(Multiple Choice)
4.8/5
(44)

Joann turned on her Windows 10 computer today, and while the computer was booting up, it shut down. She restarted the computer and it booted fine but ran slowly. She opened Task Manager and noticed that her CPU was running at 98% capacity and her network at 75% capacity. When she checked to see what process was using so much network connectivity, she received a message saying that access to the process was denied.   Based on these indicators, what should Joann do with her computer? (Select all that apply.)

(Multiple Choice)
4.9/5
(37)

Kevin recently discovered that unknown processes are running in the background on his company's web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website.   What type of attack occurred?

(Multiple Choice)
4.8/5
(30)

Lance works for a company that allows users to bring their own devices to work. Last week Lance purchased a software package from a company that allows him to change fonts on pictures that he uses in his work presentations. Lance wants to share the program with his coworker Susan.   Is Lance allowed to share the software with Susan?

(Multiple Choice)
4.9/5
(31)

Jannette has been experiencing slow performance on her computer. Today she received an error message saying that an update to her antivirus program failed. When she checked the update history, she discovered that the program had not been updated for two weeks. She restarted her computer and noticed that a file she was working on was no longer available. She also noticed that the network connection was sending data, even when she was not connected to the Internet. ​ What should Jannette do first on her computer?

(Multiple Choice)
4.7/5
(38)
Showing 21 - 40 of 71
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)