Question 176

A government organization recently contacted three different vendors to obtain cost quotes for a desktop PC refresh. The quote from one of the vendors was significantly lower than the other two and was selected for the purchase. When the PCs arrived, a technician determined some NICs had been tampered with. Which of the following MOST accurately describes the security risk presented in this situation?
  • Question 177

    After being alerted to potential anomalous activity related to trivial DNS lookups, a security analyst looks at the following output of implemented firewall rules:

    The analyst notices that the expected policy has no hit count for the day. Which of the following MOST likely occurred?
  • Question 178

    A security administrator has found a hash in the environment known to belong to malware. The administrator then finds this file to be in in the preupdate area of the OS, which indicates it was pushed from the central patch system.
    File: winx86_adobe_flash_upgrade.exe
    Hash: 99ac28bede43ab869b853ba62c4ea243
    The administrator pulls a report from the patch management system with the following output:

    Given the above outputs, which of the following MOST likely happened?
  • Question 179

    Task: Determine the types of attacks below by selecting an option from the dropdown list.

    Question 180

    An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?