A system administrator runs a file scan utility on a Windows PC and notices a file lsass.exe in the Program Files directory. What should the administrator do?

A system administrator runs a file scan utility on a Windows PC and notices a file lsass.exe in the Program Files directory. What should the administrator do? Delete the file…

Comments Off on A system administrator runs a file scan utility on a Windows PC and notices a file lsass.exe in the Program Files directory. What should the administrator do?

What is Tor?

What is Tor? a rule created in order to match a signature of a known exploit a software platform and network of P2P hosts that function as Internet routers a…

Comments Off on What is Tor?

What is the purpose of a digital certificate?

What is the purpose of a digital certificate? It guarantees that a website has not been hacked. It provides proof that data has a traditional signature attached. It ensures that…

Comments Off on What is the purpose of a digital certificate?

An administrator suspects polymorphic malware has successfully entered the network past the HIDS system perimeter. The polymorphic malware is, however, successfully identified and isolated. What must the administrator do to create signatures to prevent the file from entering the network again?

An administrator suspects polymorphic malware has successfully entered the network past the HIDS system perimeter. The polymorphic malware is, however, successfully identified and isolated. What must the administrator do to…

Comments Off on An administrator suspects polymorphic malware has successfully entered the network past the HIDS system perimeter. The polymorphic malware is, however, successfully identified and isolated. What must the administrator do to create signatures to prevent the file from entering the network again?

Match the term to the description.

Match the term to the description. Explanation & Hint: Assets: These are the information or equipment valuable enough to an organization to warrant protection. They could include things like data,…

Comments Off on Match the term to the description.

What is the goal of a white hat hacker?

What is the goal of a white hat hacker? protecting data stealing data modifying data validating data Answers Explanation & Hints: White hat hackers are actually "good guys" and are…

Comments Off on What is the goal of a white hat hacker?

What causes a buffer overflow?

What causes a buffer overflow? launching a security countermeasure to mitigate a Trojan horse downloading and installing too many software updates at one time attempting to write more data to…

Comments Off on What causes a buffer overflow?

A technician has installed a third party utility that is used to manage a Windows 7 computer. However, the utility does not automatically start whenever the computer is started. What can the technician do to resolve this problem?

A technician has installed a third party utility that is used to manage a Windows 7 computer. However, the utility does not automatically start whenever the computer is started. What…

Comments Off on A technician has installed a third party utility that is used to manage a Windows 7 computer. However, the utility does not automatically start whenever the computer is started. What can the technician do to resolve this problem?

What is the dark web?

What is the dark web? It is a website that reports the most recent activities of cybercriminals all over the world. It is part of the internet that can only…

Comments Off on What is the dark web?

Which statement describes cyberwarfare?

Which statement describes cyberwarfare? Cyberwarfare is an attack carried out by a group of script kiddies. It is simulation software for Air Force pilots that allows them to practice under…

Comments Off on Which statement describes cyberwarfare?

A company has just had a cybersecurity incident. The threat actor appeared to have a goal of network disruption and appeared to use a common security hack tool that overwhelmed a particular server with a large amount of traffic. This traffic rendered the server inoperable. How would a certified cybersecurity analyst classify this type of threat actor?

A company has just had a cybersecurity incident. The threat actor appeared to have a goal of network disruption and appeared to use a common security hack tool that overwhelmed…

Comments Off on A company has just had a cybersecurity incident. The threat actor appeared to have a goal of network disruption and appeared to use a common security hack tool that overwhelmed a particular server with a large amount of traffic. This traffic rendered the server inoperable. How would a certified cybersecurity analyst classify this type of threat actor?

Refer to the exhibit. Internet privileges for an employee have been revoked because of abuse but the employee still needs access to company resources. What is the best ACL type and placement to use in this situation?

Refer to the exhibit. Internet privileges for an employee have been revoked because of abuse but the employee still needs access to company resources. What is the best ACL type…

Comments Off on Refer to the exhibit. Internet privileges for an employee have been revoked because of abuse but the employee still needs access to company resources. What is the best ACL type and placement to use in this situation?

What is a WAN?

What is a WAN? a network infrastructure that provides access in a small geographic area a network infrastructure designed to provide data storage, retrieval, and replication a network infrastructure that…

Comments Off on What is a WAN?