Question 121

company's website is responsible for the theft of customer credit card numbers. An investigation determined private keys for certificates were stolen, allowing attackers to decrypt traffic between clients and the website. Which of the following types of attacks does this describe?
  • Question 122

    After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users Which of the following is the BEST way for the technician to perform this security feature?
  • Question 123

    A junior Linux systems administrator needs to update system software.
    Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
  • Question 124

    Ann, a user, received an email from an unknown source with an attachment claiming to be pictures from her beach vacation. When Ann opened the attachment, she was prompted to enable macros. Once the macros were enabled, the antivirus software triggered an alert. The malicious activity was stepped by the antivirus software. Which of the following should be recommended as the FIRST line of defense to prevent this attack vector from reoccurring?
  • Question 125

    A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the "My Documents" folder is empty, and personal settings are reset.
    Which of the following would be required to resolve the issue?