a)The chief information security officer has requested information about a recent regional breach that affected many companies, including yours. Which of the following would be the least helpful threat intelligence source to use to investigate?
|
|
|
c. File and code repositories |
|
|
|
d. Vulnerability databases |
|
|
b)Moe is trying to add a new operating system to a personal computer. He was able to install Linux in the free space available on the hard drive and adjust the boot loader so that he can select an operating system when booting. However, when he tries to boot to Linux, the system will not allow it. He has determined that boot security is stopping him. Which of the following is the most likely reason for this?
|
a. Secure Boot does not have the proper information to allow the system to boot. |
|
|
|
b. The computer is using a legacy BIOS boot. |
|
|
|
c. Measured Boot cannot access the server to assess the security. |
|
|
|
d. The computer is using UEFI Native Mode. |
|
c)Your security team is hardening the workstation operating system in your organization. Which of the following is not a task they would complete while hardening?
|
|
b. Disable the guest account. |
|
|
|
c. Install a Host Intrusion Detection System (HIDS). |
|
|
|
d. Reduce the number of tasks that a user can complete on the OS. |
|