A technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can the technician use to replace or fix any corrupted system files?

A technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can…

Comments Off on A technician has successfully removed malware from a PC and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. What utility can the technician use to replace or fix any corrupted system files?

What are two file attributes in the Windows environment? (Choose two.)

What are two file attributes in the Windows environment? (Choose two.) details archive read-only security general Explanation & Hint: The file attributes are read-only, archive, hidden, and system. Details, security,…

Comments Off on What are two file attributes in the Windows environment? (Choose two.)

A user needs to connect to Cisco.com but does not know the IP address for this website. What type of server will translate the website name into an IP address?

A user needs to connect to Cisco.com but does not know the IP address for this website. What type of server will translate the website name into an IP address?…

Comments Off on A user needs to connect to Cisco.com but does not know the IP address for this website. What type of server will translate the website name into an IP address?

What characteristic best describes a magstripe reader?

What characteristic best describes a magstripe reader? an input device that reads encoded information from the back of plastic cards an input device that digitizes an image by placing the…

Comments Off on What characteristic best describes a magstripe reader?

A threat hunter is concerned about a significant increase in TCP traffic sourced from port 53. It is suspected that malicious file transfer traffic is being tunneled out using the TCP DNS port. Which deep packet inspection tool can detect the type of application originating the suspicious traffic?

A threat hunter is concerned about a significant increase in TCP traffic sourced from port 53. It is suspected that malicious file transfer traffic is being tunneled out using the…

Comments Off on A threat hunter is concerned about a significant increase in TCP traffic sourced from port 53. It is suspected that malicious file transfer traffic is being tunneled out using the TCP DNS port. Which deep packet inspection tool can detect the type of application originating the suspicious traffic?

Which information security component is compromised in a DDoS attack?

Which information security component is compromised in a DDoS attack? confidentiality accountability integrity availability Explanation & Hint: Confidentiality, integrity, and availability are the elements contained in the CIA triad. Availability…

Comments Off on Which information security component is compromised in a DDoS attack?

What is a disadvantage of DDNS?

What is a disadvantage of DDNS? DDNS is considered malignant and must be monitored by security software. DDNS is unable to co-exist on a network subdomain that also uses DNS.…

Comments Off on What is a disadvantage of DDNS?

Which approach can help block potential malware delivery methods, as described in the Cyber Kill Chain model, on an Internet-faced web server?

Which approach can help block potential malware delivery methods, as described in the Cyber Kill Chain model, on an Internet-faced web server? Audit the web server to forensically determine the…

Comments Off on Which approach can help block potential malware delivery methods, as described in the Cyber Kill Chain model, on an Internet-faced web server?

A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply?

A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the…

Comments Off on A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply?

Which device in a layered defense-in-depth approach denies connections initiated from untrusted networks to internal networks, but allows internal users within an organization to connect to untrusted networks?

Which device in a layered defense-in-depth approach denies connections initiated from untrusted networks to internal networks, but allows internal users within an organization to connect to untrusted networks? internal router…

Comments Off on Which device in a layered defense-in-depth approach denies connections initiated from untrusted networks to internal networks, but allows internal users within an organization to connect to untrusted networks?

An administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must the BYOD security policy address? (Choose three.)

An administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must…

Comments Off on An administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must the BYOD security policy address? (Choose three.)