A technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can the technician use to replace or fix any corrupted system files?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can…

Continue ReadingA technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can the technician use to replace or fix any corrupted system files?

What are two file attributes in the Windows environment? (Choose two.)

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are two file attributes in the Windows environment? (Choose two.) details archive read-only security general Explanation & Hint: The file attributes are read-only, archive, hidden, and system. Details, security,…

Continue ReadingWhat are two file attributes in the Windows environment? (Choose two.)

Which two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.) hard disk drives solid state drives RAM cache CPU registers Explanation &…

Continue ReadingWhich two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)

A user needs to connect to Cisco.com but does not know the IP address for this website. What type of server will translate the website name into an IP address?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A user needs to connect to Cisco.com but does not know the IP address for this website. What type of server will translate the website name into an IP address?…

Continue ReadingA user needs to connect to Cisco.com but does not know the IP address for this website. What type of server will translate the website name into an IP address?

A user complains that the laptop display is flickering. Which two problems could cause this situation? (Choose two.)

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A user complains that the laptop display is flickering. Which two problems could cause this situation? (Choose two.) The track pad is dirty. Power to the pixels has been cutoff.…

Continue ReadingA user complains that the laptop display is flickering. Which two problems could cause this situation? (Choose two.)

Which three fields are found in both the TCP and UDP headers? (Choose three.)

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which three fields are found in both the TCP and UDP headers? (Choose three.) options source port destination port checksum sequence number window Explanation & Hint: The UPD header has…

Continue ReadingWhich three fields are found in both the TCP and UDP headers? (Choose three.)

A threat hunter is concerned about a significant increase in TCP traffic sourced from port 53. It is suspected that malicious file transfer traffic is being tunneled out using the TCP DNS port. Which deep packet inspection tool can detect the type of application originating the suspicious traffic?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A threat hunter is concerned about a significant increase in TCP traffic sourced from port 53. It is suspected that malicious file transfer traffic is being tunneled out using the…

Continue ReadingA threat hunter is concerned about a significant increase in TCP traffic sourced from port 53. It is suspected that malicious file transfer traffic is being tunneled out using the TCP DNS port. Which deep packet inspection tool can detect the type of application originating the suspicious traffic?

Which information security component is compromised in a DDoS attack?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which information security component is compromised in a DDoS attack? confidentiality accountability integrity availability Explanation & Hint: Confidentiality, integrity, and availability are the elements contained in the CIA triad. Availability…

Continue ReadingWhich information security component is compromised in a DDoS attack?

Which access control model allows users to control access to data as an owner of that data?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which access control model allows users to control access to data as an owner of that data? mandatory access control nondiscretionary access control discretionary access control attribute-based access control Explanation…

Continue ReadingWhich access control model allows users to control access to data as an owner of that data?

Match the network monitoring solution with a description. (Not all options are used.)

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Match the network monitoring solution with a description. (Not all options are used.) Explanation & Hint: SPAN (Switched Port Analyzer) or port mirroring: This network monitoring solution is used to…

Continue ReadingMatch the network monitoring solution with a description. (Not all options are used.)

Which approach can help block potential malware delivery methods, as described in the Cyber Kill Chain model, on an Internet-faced web server?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which approach can help block potential malware delivery methods, as described in the Cyber Kill Chain model, on an Internet-faced web server? Audit the web server to forensically determine the…

Continue ReadingWhich approach can help block potential malware delivery methods, as described in the Cyber Kill Chain model, on an Internet-faced web server?

A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the…

Continue ReadingA user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply?

A piece of malware has gained access to a workstation and issued a DNS lookup query to a CnC server. What is the purpose of this attack?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A piece of malware has gained access to a workstation and issued a DNS lookup query to a CnC server. What is the purpose of this attack? to send stolen…

Continue ReadingA piece of malware has gained access to a workstation and issued a DNS lookup query to a CnC server. What is the purpose of this attack?

What are three characteristics of an information security management system? (Choose three.)

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What are three characteristics of an information security management system? (Choose three.) It involves the implementation of systems that track the location and configuration of networked devices and software across…

Continue ReadingWhat are three characteristics of an information security management system? (Choose three.)

Which device in a layered defense-in-depth approach denies connections initiated from untrusted networks to internal networks, but allows internal users within an organization to connect to untrusted networks?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which device in a layered defense-in-depth approach denies connections initiated from untrusted networks to internal networks, but allows internal users within an organization to connect to untrusted networks? internal router…

Continue ReadingWhich device in a layered defense-in-depth approach denies connections initiated from untrusted networks to internal networks, but allows internal users within an organization to connect to untrusted networks?

An administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must the BYOD security policy address? (Choose three.)

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

An administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must…

Continue ReadingAn administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must the BYOD security policy address? (Choose three.)

How might corporate IT professionals deal with DNS-based cyber threats?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

How might corporate IT professionals deal with DNS-based cyber threats? Use IPS/IDS devices to scan internal corporate traffic. Monitor DNS proxy server logs and look for unusual DNS queries. Limit…

Continue ReadingHow might corporate IT professionals deal with DNS-based cyber threats?

If the default gateway is configured incorrectly on the host, what is the impact on communications?

  • Post author:
  • Post category:Re-Appear
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

If the default gateway is configured incorrectly on the host, what is the impact on communications? The host is unable to communicate on the local network. The host can communicate…

Continue ReadingIf the default gateway is configured incorrectly on the host, what is the impact on communications?