Question 426

After a user reports stow computer performance, a systems administrator detects a suspicious file, which was installed as part of a freeware software package.
The systems administrator reviews the output below:

Based on the above information, which of the following types of malware was installed on the user's computer?
  • Question 427

    A company is experiencing an increasing number of systems that are locking up on Windows startup. The security analyst clones a machine, enters into safe mode, and discovers a file in the startup process that runs Wstart.bat.
    @echo off
    :asdhbawdhbasdhbawdhb
    start notepad.exe
    start notepad.exe
    start calculator.exe
    start calculator.exe
    goto asdhbawdhbasdhbawdhb
    Given the file contents and the system's issues, which of the following types of malware is present?
  • Question 428

    A company is performing an analysis of the corporate enterprise network with the intent of identifying what will cause losses in revenue, referrals, and/or reputation when out of commission.
    Which of the following is an element of a BIA that is being addressed?
  • Question 429

    In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?
  • Question 430

    An organization's primary datacenter is experiencing a two-day outage due to an HVAC malfunction. The node located in the datacenter has lost power and is no longer operational, impacting the ability of all users to connect to the alternate datacenter. Which of the following BIA concepts BEST represents the risk described in this scenario?