Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center.
What is your companyâs new security called?

Theft prevention
Mantrap
Entry control roster
Security outpost
Your company has decided that security is very important and wants to add a second security check that will identify its employees while they are logging in to their computers.
What type of security do you recommend?

a. Key fobs

b. Smart cards

c. Biometric locks

d. Hardware tokens

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.
What type of malware is on your computer?

Trojan
Ransomware
Rootkit
Virus
Recently, Frankâs computer has slowed down dramatically. He has also noticed that the time on the computer is not accurate. Frank has run several antivirus scans, but has not found an issue. Today while surfing the web, he was redirected several times to a website that he did not request. Then a BSOD error occurred on his computer, and when he turned on his computer, the antivirus software was disabled.
What kind of malware could be causing the issues on Frankâs computer?



Zombie
Rootkit
Spyware
Ransomware
Jordan is talking with a client on the phone. Jordanâs company recently completed updates on the clientâs system and something is not working properly. The client asks Jordan why the company is always doing updates. Jordan explain that updates help to secure computer systems.
What specific vulnerability do updates help prevent?

Zero-day
DDoS
Brute force
Man-in-the-middle
Your companyâs email server has been filling up employeeâs email boxes with advertisements for things they did not request. You have been asked to research how to stop these types of messages from getting to your coworkerâs email client software.
What will you recommend to your supervisor?

Enable the firewall.
Enable the spam filter.
Enable port forwarding.
Enable MAC filtering.
Jerry has received an email on his companyâs email system. The email is in regard to a new update the company plans to implement. The administrators are requesting that everyone send their username and password so that the administrators can compile a list and avoid having everyone change their passwords.
What type of attack is this?

Spear phishing
Impersonation
Shoulder surfing
Tailgating
Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a competitor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent.
What should Ken do next?

Report the person through proper channels.
Approach the VP and ask him about the email.
Ignore the email; it is not his job.
Go right to the president of the company.
James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away.
â What can James use to wipe the data clean? (Select TWO.)



Zero-fill utility
Format the drive
ATA Secure Erase
Smash the USB drive

Respuesta :

Answer:

1. Entry control roster - List of people that are allowed to enter a guarded area. Used by security guard to allow, or not allow, people enter the secured area.

2. Biometric locks - Biometric authentication like fingerprint or face scanning can be integrated on the computer systems to provide better security.

3. Virus - A program written to damage, replicate or alter files or data.

4. Rootkit - A virus designed to remain hidden or low key while doing various types of hacking activities.

5. Zero-day - zero day are cyber attacks on vulnerabilities that have not been fixed or made public (zero day), before being patched.

6. Enable the spam filter - Spam filter recognizes bad emails or emails with malicious content including fake ads, and places them on a spam folder of your email account.

7. Phishing - A way to steal private or sensitive information like passwords, account number etc., through disguising or deceptive tactics.

8. Report the person through proper channels.

9. Format the drive - Formatting will wipe out the data on the USB drive and reset it.

Explanation: