A company has the policy that all new user passwords are P@ssw0rd but does not
require new users to change their password. An employee randomly tries a
coworker's account with the new user password to see if they can log in as the
coworker.
Which type of vulnerability does this create? Ans✓✓✓-default password
A company provides access to employees' tax and personal information via a
public-facing web portal.
What should the company implement to encrypt employees' web access to this
information? Ans✓✓✓-Transport layer security (TLS)
A malicious user was able to lock a user's account after guessing the user's
password multiple times unsuccessfully. Which category of the CIA triad did the
malicious user target in this attack? Ans✓✓✓-Availability
A user is working on a home computer when another user seems to open an
application to view documents on the same computer. The user immediately
suspects that a back door into the computer exists.
Which action should be taken first to deal with the problem? Ans✓✓✓-Unplug
the PC's network connection
A user on a network is planning to launch an exploit against a coworker in a
neighboring department. The user needs to identify the IP address of a coworker
in the desired department.
, Which tool or utility will allow the user to watch network traffic in real time to
identify a target? Ans✓✓✓-sniffer
A user receives an email from an unknown bank saying that the user's account
with the bank has been compromised. The user suspects that this is a phishing
exploit.
How should the user safely proceed? Ans✓✓✓-Open a new browser page,
navigate to the bank's website, and acquire legitimate contact information to
report the email.
A user that does not want to be identified while communicating on a network
uses an application to alter the computer's identity. Which type of exploit is being
perpetrated? Ans✓✓✓-spoofing
After downloading a CD/DVD burning program, a user notices that someone is
remotely accessing the computer during nighttime hours.
Which type of malware is likely found in the CD/DVD software? Ans✓✓✓-Trojan
horse
An analyst has identified an active denial of service attack.
Which category of the CIA triad is affected? Ans✓✓✓-Availability