CIS 297 Wk 4 Apply – Module 17 Test

0 items
CIS 297 Wk 4 Apply - Module 17 Test
CIS 297 Wk 4 Apply – Module 17 Test
$9.00
  • Description

CIS 297 Wk 4 Apply – Module 17 Test

Click MindTap Access in the Course Content section to locate the test.

Complete the Module 17 Test in the Apply folder.

Note: You have one attempt to complete the test.

Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation, she receives an error message saying the software cannot be installed. The error reports that she does not have the privilege to install software. Jennifer is using the administrator account, so she knows she should be able to install the program.

 

What can Jennifer try next to install anti-malware software?

 

  1. Install in Windows PE.

 

 

  1. Install in Safe Mode.

 

 

  1. Use Windows RE to install the software.

 

 

  1. She will not be able to install the software and should reinstall Windows.

 

 

 

A customer called Derek to complain that her computer was running slow, so he went to the client work area and started troubleshooting the problem. Derek ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger.

 

 

 

Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize.

 

What should Derek perform next on the client’s computer?

 

  1. Run memory diagnostics.

 

 

  1. Download a CPU diagnostic program.

 

 

  1. Run a virus scan.

 

 

  1. Refresh Windows.

 

 

 

Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence.

 

What must Jacob maintain so the evidence can be used to prosecute the crime?

 

  1. Incident documentation

 

 

  1. Chain of custody

 

 

  1. A backup of the data

 

 

  1. Private property laws

 

 

Nick works for a software development company that has just created a new application that will revolutionize the computer security industry. Nick’s company owns the patent for the software and has a copyright for the software. The company would like to sell this new software but they are concerned about someone pirating the software.

 

What can Nick’s company use to prevent software piracy?

 

  1. Copyright

 

 

  1. EULA

 

 

  1. DRM

 

 

  1. Issue a license

 

 

 

Hector is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. When he opens the Action Center, Hector realizes that Windows Defender has been disabled and another antivirus software is running. Hector does not recognize the other antivirus software.

 

What type attack has infected Hector’s computer?

 

  1. Spam

 

 

  1. Security alert

 

 

  1. Hijacked email

 

 

  1. Rogue antivirus

 

 

Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to research a new product when his computer emitted an alarm accompanied by a warning that a site had blocked his computer and that information was being stolen from the computer. The message included a phone number and a note to call the number within five minutes so that engineers could walk him through the removal process.

 

What has happened to the customer computer?

 

  1. The client received a fake security alert.

 

 

  1. This is a real alert, and the client should call the number.

 

 

  1. Data is being stolen, and the client should disconnect from the network.

 

 

  1. The web browser has been hijacked by a virus

 

 

Lance works for a company that allows users to bring their own devices to work. Last week Lance purchased a software package from a company that allows him to change fonts on pictures that he uses in his work presentations. Lance wants to share the program with his coworker Susan.

 

Is Lance allowed to share the software with Susan?

 

  1. Susan would need to purchase the software from the company.

 

 

  1. Lance purchased the software for work and can share it with coworkers.

 

 

  1. The software is open source, so Lance can share the software with Susan.

 

 

  1. The software was purchase by Lance with a site license and can be used by Susan.

 

 

Samantha is having an issue with Windows crashing and believes that malicious software is causing it to crash. Samantha also has received application errors that have cause the applications to close.

 

Which event log in the Event Viewer can Samantha inspect to see if malicious software is causing the Windows system to crash and the application errors, system errors, and other types of errors?

 

  1. System logs

 

 

  1. Security logs

 

 

  1. Setup logs

 

 

  1. Application

 

 

Becky has been assigned to help with a major change to her company’s accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor causes the change to fail.

 

What is Becky’s mistake called?

 

  1. Scope of change

 

 

  1. Out of scope modification

 

 

  1. Change modification

 

 

  1. Request for comments

 

 

Tracy works for an insurance company that recently received so much spam that the email server became overwhelmed and shut down. Tracy’s supervisor has asked her to make sure this does not happen again.

 

What is the first thing Tracy should do to prevent this problem from happening again?

 

  1. User education

 

 

  1. MAC filtering

 

 

  1. Firewall

 

 

  1. Email filtering

 

 

Your company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS.

 

What will you recommend as an upgrade to RADIUS?

 

  1. RADIUS+

 

 

  1. TACACS+

 

 

  1. AES

 

 

  1. WPA2

 

 

 

Holly has been tasked to design the plan the IT department will use when making a change to systems. The plan will be used anytime the company needs to change a system and should include which people are to be contacted when changes are made and what the changes will do to other equipment.

 

While Holly writes the change document, what types of things will she need to include in the scope of change? (Select all that apply.)

  1. Key components of the change and how they will be addressed

 

  1. Risk or problems that might arise during the change

 

  1. Skill sets, tasks, and activities required to carry out the change

 

  1. A plan in case something happens and the change cannot be executed

 

  1. Who will participate in the change

 

  1. How the success of the change will be measured

 

 

Gwen has discovered a program that has copied itself throughout the network. The program does not appear to have a host program and is overloading the network as it replicates. It has even installed a web server on the network and is allowing other computers to connect.

 

What type of malware has Gwen discovered?

 

  1. Worm

 

 

  1. Trojan

 

 

  1. Spyware

 

 

  1. Rootkit

 

 

Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center.

 

What is your company’s new security called?

 

  1. Theft prevention

 

 

  1. Mantrap

 

 

  1. Entry control roster

 

 

  1. Security outpost

 

 

 

During an upgrade for a new web server, Glen’s company experienced a power surge. The power surge hit the new server, and now the company must troubleshoot the server.

 

What can the company implement that will get the website up and running without the new server?

 

  1. Back-out plan

 

 

  1. Plan for change

 

 

  1. Risk analysis

 

 

  1. Change analysis plan

 

 

 

When working with a security consultant that your company has hired, you notice that he is running software on one of the machines. He explains that the program is running a brute force attack that is using every word in the English language to see if the Administrator password can be cracked.

 

What type of attack is he attempting?

 

  1. Rainbow table

 

 

  1. Dictionary

 

 

  1. Zero-day

 

 

  1. Phishing

 

 

 

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.

 

What type of malware is on your computer?

 

  1. Trojan

 

 

  1. Ransomware

 

 

  1. Rootkit

 

 

  1. Virus

 

 

Karen received a call from a client whose computer will not boot. The client explained that he had just received an error message about a virus on the computer. When Karen arrived, she tried to boot the computer in Safe Mode, but that did not work. Karen decided to install the hard drive on a working computer.

 

What should Karen do after she installs the hard drive on a second computer?

 

  1. Scan the hard drive in the new computer with antivirus software.

 

 

  1. Copy the important data to the working computer.

 

 

  1. Get Windows updates.

 

 

  1. Get malware updates.

 

 

 

Lana has just taken a job as an IT professional in Europe and would like to get a head start on what to expect.

 

What regulated data would you recommend that she research?

 

  1. PII

 

 

  1. PHI

 

 

  1. PCI

 

 

  1. GDPR

 

 

Christian has malware that is preventing him from installing anti-malware on his laptop.

 

What can Christian try if he does not have another computer available to run the anti-malware program?

 

  1. Try to install in Safe Mode.

 

 

  1. Try to install in Windows RE.

 

 

  1. Try to install in Windows PowerShell.

 

 

  1. Create a virtual machine and install the anti-malware program.