ST0-192.pdf - Symantec ST0-192 Symantec Technical Foundations Security Solutions 2.0 Technical Assessment http\/killexams.com\/exam-detail\/ST0-192

ST0-192.pdf - Symantec ST0-192 Symantec Technical...

This preview shows page 1 - 3 out of 7 pages.

ST0-192SymantecSymantec Technical Foundations: Security Solutions 2.0 Technical Assessment:
Background image
QUESTION: 86 Why would a cybercriminal avoid using a trojan in a widespread attack? A. trojans are easily caught by antivirus products B. end-users are aware of clicking on non-trusted executables C. trojans only infect one system at a time D. execution of trojans are dependent on the operating system Answer: C QUESTION: 87 A cybercriminal is trying to get a foothold into an organization by exploiting a weakness in their web servers. What is the most common website vulnerability that cybercriminals can use? A. guest user accounts B. default credentials C. open shares D. excessive directory access rights Answer: B QUESTION: 88 What is the most common method bots may use to extract data?A. SSL B. IRC C. FTP D. P2P Answer: C QUESTION: 89 An organization has a requirement to ensure they are meeting industry best practices for securing their IT environment. Which strategy is appropriate for this organization?
Background image
Image of page 3

You've reached the end of your free preview.

Want to read all 7 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture