Last Updated on November 20, 2022 by InfraExam

Question 8 (1 point...
 
Notifications
Clear all

Question 8 (1 point) Which of the following is a characteristics of a virus? Question 8 options: A virus has an enabling vulnerability, a propagation mechanism, and a payload A virus can be dormant and then activate at a specific time or date

3 Posts
2 Users
4 Likes
631 Views
2
Topic starter

Question 8 (1 point)

 

 
 
 
 
 
 
 

Which of the following is a characteristics of a virus?

 
Question 8 options:

A virus has an enabling vulnerability, a propagation mechanism, and a payload

A virus can be dormant and then activate at a specific time or date

A virus replicates itself by independently exploiting vulnerabilities in networks

A virus provides the attacker with sensitive data, such as passwords

 

Question 9 (1 point)

 

 
 
 
 
 
 
 

Which of the following monitoring tools captures packets and saves them in a PCAP file?

 
Question 9 options:

NetFlow

Wireshark

SNMP

SIEM

 

Question 10 (1 point)

 

 
 
 
 
 
 
 

An hacker connects wirelessly to the company network using a cell phone. The hacker then configures the cell phone to act as a wireless access point that will allow the company employees to connect to the network. What type of security threat is this?

 
Question 10 options:

spoofing

cracking

denial of service

rogue access point

InfraExam 07/01/2023 3:47 pm

@pang Thank you for your update. Our team is looking for the best answers. Would you let us know what course you are taking exam also the module or final exam?

2 Answers
1
Topic starter

During a cyber incident, which of the following is the BEST course of action?

1
Topic starter

A security analyst is providing a risk assessment for a medical device that will be installed on the corporate network. During the assessment, the analyst discovers the device has an embedded operating system that will be at the end of its life in two years. Due to the criticality of the device, the security committee makes a risk- based policy decision to review and enforce the vendor upgrade before the end of life is reached. Which of the following risk actions has the security committee taken?

Share: