00:00

QUESTION 6

Which of the following is an appropriate flow of the incident recovery steps?

Correct Answer: D

QUESTION 7

An adversary attacks the information resources to gain undue advantage is called:

Correct Answer: B

QUESTION 8

A malicious security-breaking code that is disguised as any useful program that installs an executable programs when a file is opened and allows others to control the victim’s system is called:

Correct Answer: A

QUESTION 9

The free utility which quickly scans Systems running Windows OS to find settings that may have been changed by spyware, malware, or other unwanted programs is called:

Correct Answer: B

QUESTION 10

The network perimeter should be configured in such a way that it denies all incoming and outgoing traffic/ services that are not required. Which service listed below, if blocked, can help in preventing Denial of Service attack?

Correct Answer: D