Before re-assigning a computer to a new employee, what data security technique does the IT department use to make sure no data is left behind by the previous user?
A. Fingerprinting
B. Digital watermarking
C. Baselining
D. Wiping
What is the most common read-only SNMP community string usually called?
A. private
B. mib
C. open
D. public
Throughout the week following a new IPS deployment, nearly every user on the protected subnet submits helpdesk tickets regarding network performance and not being able to access several critical resources. What is the most likely reason for the performance issues?
A. The incoming traffic is overflowing the device's TAP buffer
B. The in-line TAP experienced a hardware failure
C. The IPS sensor was changed from test mode to production mode
D. The IPS sensor was powered off or moved out of band
Which Windows CLI tool can identify the command-line options being passed to a program at startup?
A. netstat
B. attrib
C. WMIC
D. Tasklist
Which of the following would be included in a router configuration standard?
A. Names of employees with access rights
B. Access list naming conventions
C. Most recent audit results
D. Passwords for management access
Which Windows tool would use the following command to view a process: process where name='suspect_malware.exe'list statistics
A. TCPView
B. Tasklist
C. WMIC
D. Netstat
Which of the following would be used in order to restrict software form performing unauthorized operations, such as invalid access to memory or invalid calls to system access?
A. Perimeter Control
B. User Control
C. Application Control
D. Protocol Control
E. Network Control
Which of the following is a major problem that attackers often encounter when attempting to develop or use a kernel mode rootkit?
A. Their effectiveness depends on the specific applications used on the target system.
B. They tend to corrupt the kernel of the target system, causing it to crash.
C. They are unstable and are easy to identify after installation
D. They are highly dependent on the target OS.