Question 146
An organization's Chief Executive Officer (CEO) directs a newly hired computer technician to install an OS on the CEO's personal laptop. The technician performs the installation, and a software audit later in the month indicates a violation of the EULA occurred as a result. Which of the following would address this violation going forward?
Question 147
Which of the following AES modes of operation provide authentication? (Select two.)
Question 148
A security administrator is reviewing the following network capture:
192.168.20.43:2043 -> 10.234.66.21:80
POST "192.168.20.43 Error! Hyperlink reference not valid."
Which of the following malware is MOST likely to generate the above information?
192.168.20.43:2043 -> 10.234.66.21:80
POST "192.168.20.43 Error! Hyperlink reference not valid."
Which of the following malware is MOST likely to generate the above information?
Question 149
A penetration testing team deploys a specifically crafted payload to a web server, which results in opening a new session as the web server daemon. This session has full read/write access to the file system and the admin console. Which of the following BEST describes the attack?
Question 150
Joe, a user, has been trying to send Ann, a different user, an encrypted document via email. Ann has not received the attachment but is able to receive the header information.
Which of the following is MOST likely preventing Ann from receiving the encrypted file?
Which of the following is MOST likely preventing Ann from receiving the encrypted file?