Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on employees’ computers?
A. Least privilege accounts
B. Host-based firewalls
C. Intrusion Detection Systems
D. Application whitelisting
CompTIA exam questions
Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on employees’ computers?
A. Least privilege accounts
B. Host-based firewalls
C. Intrusion Detection Systems
D. Application whitelisting
An auditor is given access to a conference room to conduct an analysis. When they connect their laptop’s Ethernet cable into the wall jack, they are not able to get a connection to the Internet but have a link light. Which of the following is MOST likely causing this issue?
A. Ethernet cable is damaged
B. The host firewall is set to disallow outbound connections
C. Network Access Control
D. The switch port is administratively shutdown
A computer is put into a restricted VLAN until the computer’s virus definitions are up-to-date.
Which of the following BEST describes this system type?
A. NAT
B. NIPS
C. NAC
D. DMZ
A security administrator wants to get a real time look at what attackers are doing in the wild, hoping to lower the risk of zero-day attacks. Which of the following should be used to accomplish this goal?
A. Penetration testing
B. Honeynets
C. Vulnerability scanning
D. Baseline reporting
The security administrator is observing unusual network behavior from a workstation. The workstation is communicating with a known malicious destination over an encrypted tunnel. A full antivirus scan, with an updated antivirus definition file, does not show any signs of infection.
Which of the following has happened on the workstation?
A. Zero-day attack
B. Known malware infection
C. Session hijacking
D. Cookie stealing
A security administrator is investigating a recent server breach. The breach occurred as a result of a zero-day attack against a user program running on the server. Which of the following logs should the administrator search for information regarding the breach?
A. Application log
B. Setup log
C. Authentication log
D. System log
Matt, an IT administrator, wants to protect a newly built server from zero day attacks. Which of the following would provide the BEST level of protection?
A. HIPS
B. Antivirus
C. NIDS
D. ACL
A network administrator receives a call asking for assistance with connecting to the network. The user asks for the IP address, subnet class, and VLAN required to access the network. This describes which of the following attacks?
A. Social engineering
B. Spoofing
C. Zero-day attack
D. VLAN hopping
Exploiting a weakness in a user’s wireless headset to compromise the mobile device is known as which of the following?
A. Multiplexing
B. Zero-day attack
C. Smurfing
D. Bluejacking