12
Danielle works as a data analyst in an organization. As part of her job, she sets an alarm to notify her team via an email if her Windows server uses 80 percent of its memory and to send a text message if it reaches 90 percent utilization. Which of the following options represents the task performed by Danielle in the given scenario?
Monitoring threshold
Which of the following technologies is suited to prevent wired rogue devices from connecting to a network?
NAC
Which of the following monitoring methods relies on acquiring data about a network as traffic flows through a location on a network link?
Passive monitoring
Which of the following three options are most likely to be used to handle a memory leak?
Patching, service restarts, and system reboots
Which Windows tool provides detailed information including information about USB host controllers, memory usage, and disk transfers?
Perfmon
Chris works as a network administrator in an organization. He wants to use an active monitoring approach to test his network. Which of the following techniques is appropriate for Chris to test the network in the given scenario?
Pinging remote systems
Adam is performing an internal security assessment and wants to identify services running on servers. Which of the following will he use to identify services available on servers?
Port scan
A security administrator wants to manage both local and remote hosts together on a Windows system. Which of the following can a security administrator use to accomplish the given task?
PowerShell
Monica, a security administrator, wants to use a tool that will aggregate log and event data from the virtual and real networks, applications, and systems and also provides real-time reporting and alerting on information or events that may require intervention or other types of response. Which tool should she use in the given scenario?
SIEM
What are SNMP alert messages called?
SNMP traps
Sam needs to deploy a tool that includes resources and utilities to manage, diagnose, troubleshoot, and monitor a Microsoft Windows environment. Which tool should Sam use?
Sysinternals
Susan works as a network administrator in an organization. While observing a router via network flows, she sees a sudden drop in network traffic levels to zero and the traffic chart shows a flat line. What has likely happened in the given scenario?
The monitored link failed.
Lauren finds that the version of Java installed on her organization's web server has been replaced. Which type of issue has taken place on an organization's web server?
Unauthorized change
Alex works as an application developer in an organization. He wants to prohibit software that is not expressly allowed by his organization's desktop management team from being installed on workstations. Which type of tool should Alex use to accomplish his task in the given scenario?
Whitelisting
Which of the following Linux commands will show a user how much disk space is in use?
df
Which of the following commands is not useful for monitoring memory usage in Linux?
df
Juan works as a network administrator in an organization. He wants to see a list of processes along with their CPU utilization in an interactive format. Which of the following built-in Linux commands should he use to accomplish his task in the given scenario?
top
Sayed works as a data analyst in an organization. He manages Windows workstations and is planning to prohibit a variety of files, including games, from being installed on these workstations. Which of the following tools or applications can allow Sayed to achieve his task in the given scenario?
Blacklisting
Cynthia wants to build scripts to detect malware beaconing behavior. Which of the following is not a means of identifying malware beaconing behavior for building scripts on a network?
Beacon protocol
Avika works as a network administrator in an organization. She has been asked to identify unexpected traffic on her organization's network. Which of the following is not a technique that she should use to accomplish her task in the given scenario?
Beaconing
Which of the following is an activity sent to a command and control (C&C) system as part of a botnet or a malware remote control system?
Beaconing
Which of the following terms describes a system sending heartbeat traffic to a botnet command and a control server?
Beaconing
What does the MAC address of a rogue device tells a user?
Manufacturer of the device
Which of the following tools does not provide real time drive capacity monitoring for Windows?
Microsoft Endpoint Configuration Manager