Last Updated on November 20, 2022 by InfraExam
Question 8 (1 point)
Which of the following is a characteristics of a virus?
Question 9 (1 point)
Which of the following monitoring tools captures packets and saves them in a PCAP file?
Question 10 (1 point)
An hacker connects wirelessly to the company network using a cell phone. The hacker then configures the cell phone to act as a wireless access point that will allow the company employees to connect to the network. What type of security threat is this?
During a cyber incident, which of the following is the BEST course of action?
A security analyst is providing a risk assessment for a medical device that will be installed on the corporate network. During the assessment, the analyst discovers the device has an embedded operating system that will be at the end of its life in two years. Due to the criticality of the device, the security committee makes a risk- based policy decision to review and enforce the vendor upgrade before the end of life is reached. Which of the following risk actions has the security committee taken?