Question 66

A user's PC was recently infected by malware. The user has a legacy printer without vendor support, and the user's OS is fully patched. The user downloaded a driver package from the internet. No threats were found on the downloaded file, but during file installation, a malicious runtime threat was detected. Which of the following is MOST likely cause of the infection?
  • Question 67

    Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?
  • Question 68

    After a phishing scam for a user's credentials, the red team was able to craft a payload to deploy on a server. The attack allowed the installation of malicious software that initiates a new remote session. Which of the following types of attacks has occurred?
  • Question 69

    A security analyst is hardening a network infrastructure. The analyst is given the following requirements;
    * Preserve the use of public IP addresses assigned to equipment on the core router.
    * Enable "in transport 'encryption protection to the web server with the strongest ciphers.
    Which of the following should the analyst implement to meet these requirements? (Select TWO).
  • Question 70

    When planning to build a virtual environment, an administrator need to achieve the following,
    * Establish polices in Limit who can create new VMs
    * Allocate resources according to actual utilization'
    * Require justification for requests outside of the standard requirements.
    * Create standardized categories based on size and resource requirements Which of the following is the administrator MOST likely trying to do?