A technician receives a device with the following anomalies: Frequent pop-up ads Show response-time switching between active programs Unresponsive peripherals The technician reviews the following log file entries: File Name Source MD5 Target MD5 Status antivirus.exe F794F21CD33E4F57890DDEA5CF267ED2 F794F21CD33E4F57890DDEA5CF267ED2 Automatic iexplore.exe 7FAAF21CD33E4F57890DDEA5CF29CCEA AA87F21CD33E4F57890DDEAEE2197333 Automatic service.exe 77FF390CD33E4F57890DDEA5CF28881F 77FF390CD33E4F57890DDEA5CF28881F Manual USB.exe E289F21CD33E4F57890DDEA5CF28EDC0 E289F21CD33E4F57890DDEA5CF28EDC0 Stopped Based on the above output, which of the following should be reviewed?
A) The web application firewall
B) The file integrity check
C) The data execution prevention
D) The removable media control
Correct Answer:
Verified
Q273: A cybersecurity analyst is looking into the
Q274: Which of the following describes the key
Q275: Which of the following components of printers
Q276: Attackers have been using revoked certificates for
Q277: Which of the following is used to
Q279: Which of the following controls allows a
Q280: When it comes to cloud computing, if
Q281: A remote intruder wants to take inventory
Q282: Which of the following uses precomputed hashes
Q283: A security analyst is reviewing an assessment
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents