Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the name of the Windows XP/2003 tool that you can use to schedule commands to be executed on remote systems during off-peak hours?

A.

SCHTASKS.EXE

B.

SCHEDULETSKS.EXE

C.

SCHEDULR.EXE

D.

SCHRUN.EXE

There are three key factors in selecting a biometric mechanism. What are they?

A.

Reliability, encryption strength, and cost

B.

Encryption strength, authorization method, and cost

C.

Reliability, user acceptance, and cost

D.

User acceptance, encryption strength, and cost

Jonny Is an IT Project Manager. He cannot access the folder called "IT Projects" but can access a folder called "Sales Data" even though he's not on the sales team. Which information security principle has failed?

A.

Authentication

B.

Authorization

C.

Identification

D.

Accountability

Analyze the screenshot below. What is the purpose of this message?

A.

To gather non-specific vulnerability information

B.

To get the user to download malicious software

C.

To test the browser plugins for compatibility

D.

To alert the user to infected software on the computer.

You have implemented a firewall on the company's network for blocking unauthorized network connections. Which of the following types of security control is implemented in this case?

A.

Detective

B.

Preventive

C.

Directive

D.

Corrective

Where are user accounts and passwords stored in a decentralized privilege management environment?

A.

On a central authentication server.

B.

On more than one server.

C.

On each server.

D.

On a server configured for decentralized privilege management.

Which of the following activities would take place during the containment phase?

A.

Disseminating change management documentation regarding the steps taken during incident.

B.

Rebuild a virtual server from scratch using the original installation media.

C.

Correlating logs from the firewall, PCAPs from an IPS, and syslogs from a server to

build a timeline.

D.

Creating a binary backup of the system's Infected hard drive for usage in a forensic

Investigation.

Which of the following is generally practiced by the police or any other recognized governmental authority?

A.

Spoofing

B.

SMB signing

C.

Wiretapping

D.

Phishing

Which of the following types of computers is used for attracting potential intruders?

A.

Files pot

B.

Honey pot

C.

Data pot

D.

Bastion host

A security analyst has entered the following rule to detect malicious web traffic:

alert tcp any -> 192.168.1.0/24 SO (msg: Attempted SQL Injection!"; sld:20000O01;)

How can this rule be changed to reduce false positives?

A.

Change the rule to make it apply bi -directional to source and destination

B.

Add more detail in the rule to make it more specific to the attack pattern

C.

Add an additional rule to apply to destination port 443 as well as 80

D.

Make the IP range more general so that it applies to all webservers