Search results for #CompTIAprep
#CompTIAprep: What type of threat actor is likely behind the off-hours copying of confidential records at a financial institution, done by an employee passed over for a promotion?
#CompTIAprep: Maria, a network administrator, receives a report detailing several open service ports on critical company servers. She wants to verify the accuracy of the report. Which of the following tools would be BEST for Maria to use to validate the findings?
#CompTIAprep: Lucy, a security analyst, is informed that several employees have been receiving unauthorized file transfer requests via Bluetooth when they are in the company's cafeteria. Which of the following attacks is MOST likely being attempted?
#CompTIAprep: What threat is likely in a PDF that causes an IDS alert after being opened, downloaded from a vendor's website by an XYZ Corp employee?
#CompTIAprep: What type of attack involves receiving an SMS from 'your bank' about unauthorized activity, urging you to click a link and verify account details, despite no visible account issues?
#CompTIAprep: What technology allows IT teams to detect and analyze malicious activities by using a monitored, isolated environment that mimics a legitimate part of their network?
#CompTIAprep: What security concept is a portal using when it requires Alice to enter a unique username and a secret passphrase to verify her identity?
#CompTIAprep: What physical security measure is most effective as a first line of defense for DataCenter Inc., located in a protest-prone area, to deter unauthorized access?
#CompTIAprep: What is the term for a security system requiring two authorization checks?
#CompTIAprep: What is the term for a deliberately placed piece of data in a system, monitored to detect unauthorized access by a security review?Honeystring