Exam page:   1     2     3     4     5     6     7  

Microsoft - Analyzing Data with Microsoft Power BI - DA-100 exam dumps

You are developing a report page in Microsoft Power BI Desktop. Some of your users will use a screen reader to consume the report. You want these users to consume report in a chronological order. What action should you take?

A. In Microsoft Power BI Desktop, configure the tab order

B. In Microsoft Power BI Desktop, configure the layer order

C. In Microsoft Power BI Desktop, configure the bookmark order

D. In Microsoft Power BI Desktop, configure the sort order

  Access to the full exam of DA-100 with correct answers  


ABA - Certified Trust and Fiduciary Advisor - CTFA exam dumps

Which of the following moves inversely to each other?

A. Interest rate and debt to equity ratio

B. Discount rate and P/E ratio

C. Coupon rate and leverage ratios

D. Interest rate and activity ratios

  Access to the full exam of CTFA with correct answers  


ACAMS - CAMS — Certified Anti-Money Laundering Specialis - CAMS exam dumps
A customer has held an account at a local credit institution for 10 years. The account has received deposits twice weekly for the same amount and has never shown signs of suspect behavior. Monitoring software indicated that in the past few months the account has received several large deposits that were not in line with the account history. When asked, the customer states she recently sold a piece of property, which is supported with a proof of sale. What should the compliance officer do next?
A. Investigate these unusual transactions further
B. Contact the local FIU for advice
C. File an STR with the competent authorities
D. Document reasons for not filing a STR
  Access to the full exam of CAMS with correct answers  


ACFE - Certified Fraud Examiners - CFE exam dumps

Accounting records are designed to be kept on subjective rather than objective evidence.

A. True

B. False

  Access to the full exam of CFE with correct answers  


Adobe - Adobe Certified Expert - Adobe Experience Manager Forms Developer - 9A0-410 exam dumps

User-specific data must be loaded into a form when a user opens the form as part of a Workspace endpoint. How should the data be provided to the renderer?

A. By creating a custom render component

B. Through the use of a Prepare data process specified in the forms Action Profile

C. By specifying a value in the Initial Task Data drop down in the presentation and Data section of the Workspace startpoint

D. By specifying a value in the Form Data drop down menu in the Input section of the Workspace startpoint

  Access to the full exam of 9A0-410 with correct answers  


AHIMA - Registered Health Information Administrator - RHIA exam dumps

Your Pharmacy and Therapeutics Committee has asked you to find out more about a computerized order entry system that calculates drug dosages based on patient parameters

(weight, age, etc.) and even suggests the best drug given the patient's diagnosis and current treatment. The committee is asking for information on a(n)

A. application system.

B. expert system.

C. ordering system.

D. practice parameters system.

  Access to the full exam of RHIA with correct answers  


AICPA - Certified Public Accountant (CPA) - CPA exam dumps
What happens when you attempt to compile and run the following code?
#include  
using namespace std;
int main (int argc, const char * argv[])
{
int a = 30, b = 1, c = 5, i=10;
i = b < a < c;
cout << i;
return 0;
}
A. compilation fails
B. It prints: 10
C. It prints: 0
D. It prints: 1
  Access to the full exam of CPA with correct answers  


Alfresco - Alfresco Process Services Certified Administrator (APSCA) - APSCA exam dumps

What are the Validator Configuration properties used for?

A. Enable custom validators for Tasks or Functionalities during process creation.

B. Disable validators for defined Tasks or Functionalities during process creation.

C. Disable Processes using defined Tasks or Functionalities from being deployed.

D. Enable Processes using Defined Tasks or Functionalities to be deployed.

  Access to the full exam of APSCA with correct answers  


Amazon - AWS Certified Advanced Networking - Specialty - ANS-C00 exam dumps

Your Amazon Kinesis application receives data streams from thousands of devices. The data is then stored in an on-premises Hadoop cluster. You are concerned about historical data that shows periods of sustained traffic between 1 Gbps and 2 Gbps during peaks. You must ensure that you have secure, fault- tolerant connectivity between Amazon Kinesis and your data center.

What should you implement to address these needs?

A. Deploy a single 1-Gbps Direct Connect connection with a VPN backup.

B. Deploy three 1-Gbps Direct Connect connections.

C. Deploy two 1-Gbps Direct Connect connections.

D. Set up an IPsec VPN connection over Direct Connect with two tunnels.

  Access to the full exam of ANS-C00 with correct answers  


Amazon - AWS Certified Cloud Practitioner - CLF-C01 exam dumps

How can moving to the AWS Cloud help users reduce the time dedicated to operating system patching? (Choose two.)

A. Users can take advantage of managed services on AWS.

B. Users can outsource operating system patching to the AWS Support team.

C. AWS Professional Services will upgrade instances to the latest operating system versions.

D. Users have the ability to use license-included Amazon EC2 instances.

E. Users can take advantage of AWS Systems Manager features.

  Access to the full exam of CLF-C01 with correct answers  


Amazon - AWS Certified Data Analytics - Specialty - DAS-C01 exam dumps

A banking company wants to collect large volumes of transactional data using Amazon Kinesis Data Streams for real-time analytics. The company uses PutRecord to send data to Amazon Kinesis, and has observed network outages during certain times of the day. The company wants to obtain exactly once semantics for the entire processing pipeline.

What should the company do to obtain these characteristics?

A. Design the application so it can remove duplicates during processing be embedding a unique ID in each record.

B. Rely on the processing semantics of Amazon Kinesis Data Analytics to avoid duplicate processing of events.

C. Design the data producer so events are not ingested into Kinesis Data Streams multiple times.

D. Rely on the exactly one processing semantics of Apache Flink and Apache Spark Streaming included in Amazon EMR.

  Access to the full exam of DAS-C01 with correct answers  


Amazon - AWS Certified Database - Specialty - DBS-C01 exam dumps

A company has a production environment running on Amazon RDS for SQL Server with an in-house web application as the front end. During the last application maintenance window, new functionality was added to the web application to enhance the reporting capabilities for management. Since the update, the application is slow to respond to some reporting queries.

How should the company identify the source of the problem?

A. Install and configure Amazon CloudWatch Application Insights for Microsoft .NET and Microsoft SQL Server. Use a CloudWatch dashboard to identify the root cause.

B. Enable RDS Performance Insights and determine which query is creating the problem. Request changes to the query to address the problem.

C. Use AWS X-Ray deployed with Amazon RDS to track query system traces.

D. Create a support request and work with AWS Support to identify the source of the issue.

  Access to the full exam of DBS-C01 with correct answers  


Amazon - AWS Certified Developer - Associate - DVA-C01 exam dumps

A video-hosting website has two types of members: those who pay a fee, and those who do not. Each video upload places a message in Amazon SQS. A fleet of Amazon EC2 instances polls Amazon SQS and processes each video.

The developer needs to ensure that the videos uploaded by the paying members are processed first.

How can the developer meet this requirement?

A. Create two SQS queues: one for paying members, and one for non-paying members. Poll the paying member queue first and then poll the non-paying member queue.

B. Use SQS to set priorities on individual items within a single queue; give the paying members’ videos the highest priority.

C. Use SQS to set priorities on individual items within a single queue and use Amazon SNS to encode the videos.

D. Create two Amazon SNS topics: one for paying members and one for non-paying members. Use SNS topic subscription priorities to differentiate between the two types of members.

  Access to the full exam of DVA-C01 with correct answers  


Amazon - AWS Certified DevOps Engineer - Professional - DOP-C01 exam dumps

What is the proper (best practice) way to begin a playbook?

A. -hosts: all

B. ...

C. ###

D.   Access to the full exam of DOP-C01 with correct answers  



Amazon - AWS Certified Machine Learning – Specialty - MLS-C01 exam dumps

A Data Scientist is developing a binary classifier to predict whether a patient has a particular disease on a series of test results. The Data Scientist has data on 400 patients randomly selected from the population. The disease is seen in 3% of the population.

Which cross-validation strategy should the Data Scientist adopt?

A. A k-fold cross-validation strategy with k=5

B. A stratified k-fold cross-validation strategy with k=5

C. A k-fold cross-validation strategy with k=5 and 3 repeats

D. An 80/20 stratified split between training and validation

  Access to the full exam of MLS-C01 with correct answers  


Amazon - AWS Certified Security - Specialty - SCS-C01 exam dumps

A company is hosting a web application on Amazon EC2 instances behind an Application Load Balancer (ALB). The application has become the target of a DoS attack. Application logging shows that requests are coming from small number of client IP addresses, but the addresses change regularly.

The company needs to block the malicious traffic with a solution that requires the least amount of ongoing effort.

Which solution meets these requirements?

A. Create an AWS WAF rate-based rule, and attach it to the ALB.

B. Update the security group that is attached to the ALB to block the attacking IP addresses.

C. Update the ALB subnet’s network ACL to block the attacking client IP addresses.

D. Create a AWS WAF rate-based rule, and attach it to the security group of the EC2 instances.

  Access to the full exam of SCS-C01 with correct answers  


Amazon - AWS Certified Solutions Architect – Associate - SAA-C02 exam dumps

A solutions architect observes that a nightly batch processing job is automatically scaled up for 1 hour before the desired Amazon EC2 capacity is reached. The peak capacity is the same every night and the batch jobs always start at 1 AM. The solutions architect needs to find a cost-effective solution that will allow for the desired EC2 capacity to be reached quickly and allow the Auto Scaling group to scale down after the batch jobs are complete.

What should the solutions architect do to meet these requirements?

A. Increase the minimum capacity for the Auto Scaling group.

B. Increase the maximum capacity for the Auto Scaling group.

C. Configure scheduled scaling to scale up to the desired compute level.

D. Change the scaling policy to add more EC2 instances during each scaling operation.

  Access to the full exam of SAA-C02 with correct answers  


Amazon - AWS Certified Solutions Architect - Professional - SAP-C01 exam dumps

A solutions architect at a large company needs to set up network security for outbound traffic to the internet from all AWS accounts within an organization in AWS Organizations. The organization has more than 100 AWS accounts, and the accounts route to each other by using a centralized AWS Transit Gateway. Each account has both an internet gateway and a NAT gateway for outbound traffic to the internet. The company deploys resources only into a single AWS Region.

The company needs the ability to add centrally managed rule-based filtering on all outbound traffic to the internet for all AWS accounts in the organization. The peak load of outbound traffic will not exceed 25 Gbps in each Availability Zone.

Which solution meets these requirements?

A. Create a new VPC for outbound traffic to the internet. Connect the existing transit gateway to the new VPC. Configure a new NAT gateway. Create an Auto Scaling group of Amazon EC2 instances that run an open-source internet proxy for rule-based filtering across all Availability Zones in the Region. Modify all default routes to point to the proxy’s Auto Scaling group.

B. Create a new VPC for outbound traffic to the internet. Connect the existing transit gateway to the new VPC. Configure a new NAT gateway. Use an AWS Network Firewall firewall for rule-based filtering. Create Network Firewall endpoints in each Availability Zone. Modify all default routes to point to the Network Firewall endpoints.

C. Create an AWS Network Firewall firewall for rule-based filtering in each AWS account. Modify all default routes to point to the Network Firewall firewalls in each account.

D. In each AWS account, create an Auto Scaling group of network-optimized Amazon EC2 instances that run an open-source internet proxy for rule-based filtering. Modify all default routes to point to the proxy’s Auto Scaling group.

  Access to the full exam of SAP-C01 with correct answers  


Amazon - AWS Certified SysOps Administrator - Associate - SOA-C01 exam dumps

A company is migrating its production file server to AWS. All data that is stored on the file server must remain accessible if an Availability Zone becomes unavailable or when system maintenance is performed. Users must be able to interact with the file server through the SMB protocol. Users also must have the ability to manage file permissions by using Windows ACLs.

Which solution will net these requirements?

A. Create a single AWS Storage Gateway file gateway.

B. Create an Amazon FSx for Windows File Server Multi-AZ file system.

C. Deploy two AWS Storage Gateway file gateways across two Availability Zones. Configure an Application Load Balancer in front of the file gateways.

D. Deploy two Amazon FSx for Windows File Server Single-AZ 2 file systems. Configure Microsoft Distributed File System Replication (DFSR).

  Access to the full exam of SOA-C01 with correct answers  


APICS - Certified Supply Chain Professional - CSCP exam dumps

- (Topic 3) The practice of purchasing items in large quantities and requesting that shipments be delivered directly to customers is referred to as:

A. drop shipping.

B. cross-docking.

C. breaking bulk.

D. freight equalization.

  Access to the full exam of CSCP with correct answers  


Apple - Apple Certified Mac Technician (ACMT) Mac OS X v10.6 Troubleshooting Exam - 9L0-062 exam dumps
If a user needs to change the permissions of a file to read only for all users, what is the recommended method?
A. Use the Terminal to adjust file permissions with command line tools.
B. Use Repair Permissions in the Disk Utility to adjust the file's permissions.
C. Use the Sharing & Permissions pop-up menu in the file's Get Info window to choose read only for all users.
D. Place the file into a folder, then change folder permissions to read only using the Sharing & Permissions pop-up menu in the folder's Get Info window.
  Access to the full exam of 9L0-062 with correct answers  


Apple - Apple Certified Mac Technician (ACMT) Mac Service Certification Exam - 9L0-008 exam dumps
The basis for the component isolation troubleshooting technique is an understanding of _______ and _______ within computers. SELECT TWO

A. network flow
B. coolant flow
C. power flow
D. fan air flow
E. signal flow
  Access to the full exam of 9L0-008 with correct answers  


ASQ - Quality Auditor Certification - CQA exam dumps
When is it acceptable to grant an extension of the time frame for a corrective action?
A. When the auditor cannot perform the follow-up audit as scheduled
B. When the auditee determines that the proposed corrective action is not cost-effective
C. When the corrective action plan requires more time than originally anticipated
D. When there has been a change in operators who perform the task
  Access to the full exam of CQA with correct answers  


ASQ - Quality Engineer Certification - CQE exam dumps
Which of the following would be the MOST important considerations when establishing inspection points within a production operation?
I. Inspection to prevent defects from entering the system.
II. Inspection after all operations (both manual and automated).
III. Inspection prior to a painting or masking operation.

A. I only
B. I and II only
C. I and III only
D. I,II and III
  Access to the full exam of CQE with correct answers  


Atlassian - Jira Project Administrator - ACP-600 exam dumps

You need a field which meets the following requirements:

It indicates the importance of an issue. It must be used in all projects. It must allow only a single value. It must have a default. It must have different options in different projects. It must allow options to be disabled.

Which field meets these requirements?

A. Component/s system field

B. Select List (single choice) custom field

C. Checkboxes custom field

D. Labels system field

  Access to the full exam of ACP-600 with correct answers  


BACB - BOARD CERTIFIED ASSISTANT BEHAVIOR ANALYST - BCaBA exam dumps

Once a stimulus has been determined to function as a reinforcer in a particular contingency, which of the following is likely to be true?

A. The reinforcer should be adjusted to vary during the observation perio

B. The reinforcer should be used with others in the immediate environmen

C. The effect of the reinforcer may strengthen with relevant deprivatio

D. The effect of the reinforcer will weaken if a variable interval schedule is use

  Access to the full exam of BCaBA with correct answers  


BACB - The Board Certified Behavior Analyst - BCBA exam dumps

Clifford's lawn work is steady and up to standard as long as his work is verbally praised approximately every twelfth completed mower circuit. However, at times the crew chief is unable to praise his work at that moment. When praise is not forthcoming, Clifford usually stops working. The best way to facilitate maintenance and generalization of Clifford's work, using a self-management technique, would be to:

A. have fellow workers provide praise when Clifford stops working.

B. have the crew chief use a variable schedule of reinforcement.

C. increase the delay in reinforcement until the afternoon.

D. teach Clifford how to request reinforcement for the target behavior.

  Access to the full exam of BCBA with correct answers  


BICSI - Registered Communications Distribution Designer - RCDD exam dumps

- (Topic 14) You are designing a building with a combination of Class A commercial office spaces and residences. The design program requires having unlimited cable channels available at all outlet locations. What distribution system topology will NOT provide adequate channel distribution to each location?

A. Video over balanced twisted-pair

B. Trunk and tap

C. Home run

D. Video over optical fiber

  Access to the full exam of RCDD with correct answers  


Blackberry - BlackBerry Enterprise Test Environement - BCP-221 exam dumps
BlackBerry Media Sync is used for which of the following? (Choose one.)

A. Synchronizing with the My Music folder
B. Synchronizing with the media card inserted in the computer
C. Synchronizing music from Napster
D. Synchronizing non-DRM music from Apple iTunes
E. Synchronizing music between BlackBerry devices
  Access to the full exam of BCP-221 with correct answers  


Blueprism - Certified blueprism Professional Developer - APD01 exam dumps

When using Surface Automation which of the following is a valid Action within a Read Stage to read a numeric value from a field which has been identified as a Region?

A. Read Text

B. Read Text with OCR

C. Get Current Value

D. Get Window Attribute

  Access to the full exam of APD01 with correct answers  


CA Technologies - Administration of Symantec Endpoint Protection 14 - 250-428 exam dumps

Which technology can prevent an unknown executable from being downloaded through a browser session?

A. Insight

B. Advanced Machine Learning

C. Application Control

D. Intrusion Prevention

  Access to the full exam of 250-428 with correct answers  


CertNexus - Cybersec First Responder - CFR-310 exam dumps

When tracing an attack to the point of origin, which of the following items is critical data to map layer 2 switching?

A. DNS cache

B. ARP cache

C. CAM table

D. NAT table

  Access to the full exam of CFR-310 with correct answers  


Cisco - Cisco Certified CyberOps Associate - 200-201 CBROPS exam dumps

Which organizational stakeholders are responsible for installing anti-malware software?

A. System and network administrators

B. CEO

C. CISO

D. CSIRT team

  Access to the full exam of 200-201 CBROPS with correct answers  


Cisco - Cisco Certified Network Associate - 200-301 CCNA itnv7 exam dumps

Which Cisco IOS command would you use to troubleshoot IP addressing problems?

A. ipconfig /all

B. show config

C. show running-config

D. show config-file

  Access to the full exam of 200-301 CCNA itnv7 with correct answers  


Cisco - Designing Cisco Enterprise Networks (ENSLD) - 300-420 ENSLD exam dumps

Refer to the following partial output of the show spanning-tree command.

Cisco 300-420 Exam

Which of the following statements are TRUE for the given output? (Choose all that apply.)

A. SW1 is the root bridge for VLAN0001

B. Fa0/2 is the root port for VLAN0001

C. The switch having the 0A61.0015.4D02 bridge ID is the root bridge for VLAN0001

D. The switch having the 0F2C.08A1.330E bridge ID is the root bridge for VLAN0001

E. The switch connected to the Fa0/6 port of SW1 is using its root port

F. The port Fa0/4 is in a blocking state for VLAN 0121

G.

The STP protocol in use is RSTP

  Access to the full exam of 300-420 ENSLD with correct answers  


Cisco - Implementing and Operating Cisco Data Center Core Technologies (DCCOR) - 350-601 DCCOR exam dumps

Which of the following is also known as a context within an ACI tenant?

A. an EPG

B. a bridge domain

C. a VRF instance

D. an application profile

  Access to the full exam of 350-601 DCCOR with correct answers  


Cisco - Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) - 350-401 ENCOR exam dumps

Which of the following regular expression characters should be placed at the end of a BGP AS path filter to indicate the originating AS? (Select the best answer.)

A. $

B. ^

C. *

D. ]

E. .

F. _

  Access to the full exam of 350-401 ENCOR with correct answers  


Cisco - Implementing and Operating Cisco Security Core Technologies (SCOR) - 350-701 SCOR exam dumps

On which part of the IT environment does DevSecOps focus?

A. application development

B. wireless network

C. data center

D. perimeter network

  Access to the full exam of 350-701 SCOR with correct answers  


Cisco - Implementing Automation for Cisco Collaboration Solutions (CLAUI) - 300-835 exam dumps

What is the maximum number of simultaneous paired clients when proximity service ContentShare ToClients is disabled in the Cisco Collaboration Endpoint software version 9.x?

A. 50 paired clients

B. 30 paired clients

C. 7 paired clients

D. 320 paired clients

  Access to the full exam of 300-835 with correct answers  


Cisco - Implementing Automation for Cisco Security Solutions (SAUI) - 300-735 SAUTO exam dumps

Which of the following descriptions most accurately describes split tunneling? (Select the best

answer.)

A. It enables traffic to exit the same interface through which it entered.

B. It enables traffic to flow between interfaces that share the same security level.

C. It enables a VPN tunnel to form through a firewall or NAT device.

D. It enables a VPN tunnel to determine which traffic flows should be encrypted.

  Access to the full exam of 300-735 SAUTO with correct answers  


Cisco - Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) - 300-410 ENARSI exam dumps

You have implemented OSPF for IPv6 for the following areas in OSPF AS 1:

Cisco 300-410 Exam

The cost from rtrB to the 2001:5050:D402:B333:1:FE30::/96 network is 80, while the cost from rtrB to the 2001:5050:D402:B333:2:FE59::/96 network is 130.

Which of the following area range cost commands should be executed on rtrB?

A. area 10 range 2001:5050:D402:B333::/64 cost 80

B. area 10 range 2001:5050:D402:B333::/64 cost 130

C. area 10 range 2001:5050:D402:B333::/64 cost 210

D. area 10 range 2001:5050:D402:B333::/64 cost 0

  Access to the full exam of 300-410 ENARSI with correct answers  


CIW - CIW E-Commerce Specialist Certifications exam - 1D0-525 exam dumps
Which of the following site creation models would be most appropriate for a site needing customer relationship management (CRM) and personalization?
A. Online instant storefront
B. Mid-level online instant storefront
C. Mid-level offline instant storefront
D. High-level offline instant storefront
  Access to the full exam of 1D0-525 with correct answers  


CIW - CIW Internet Business Associate - 1D0-61A exam dumps
You are configuring an e-mail client to connect to your e-mail account. Which of following is required to set up the e-mail account?
A. An HTTP address
B. An FTP address
C. A DNS server address
D. A POP3 address
  Access to the full exam of 1D0-61A with correct answers  


CIW - CIW Network Technology Associate - 1D0-61C exam dumps
Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?
A. She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi.
B. She can use the 4G phone to establish a VPN connection into the company network.
C. She can use the41G phone to call and locate a public location that provides free Wi-Fl.
D. She can use her41G phone's GPS to identify another hotel that provides in-room Internet access.
  Access to the full exam of 1D0-61C with correct answers  


CIW - CIW Perl Specialist - 1D0-437 exam dumps
Consider the following lines of code:
$_ = "This is a test";
s/^([^ ]*)\s*([^ ]*)/$2 $1/;
print;
What is the output of these lines of code?

A. hTis a test
B. isThis a test
C. i Thiss a test
D. his T is a test
  Access to the full exam of 1D0-437 with correct answers  


CIW - CIW Web Design Specialist - 1D0-520 exam dumps
Which of the following file types does not require a plug-in to be installed in the browser?
A. ASP
B. PDF
C. SVG
D. SWF
  Access to the full exam of 1D0-520 with correct answers  


CIW - CIW Web Foundations Associate certification exam - 1D0-610 exam dumps
ABC Company develops its Own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?
A. Cloud-only solution
B. Regional systems solution
C. Location systems solution
D. Multiple cloud-service providers
  Access to the full exam of 1D0-610 with correct answers  


CIW - User Interface Designer - 1D0-621 exam dumps

Which of the following is a clear and specific vision statement?

A. Our website will be the most popular micro-blogging website for users ages 18 to 24 in the United States. We will have a minimum of 2 million daily views and earn at least $4,000,000 in revenues for the first three years.

B. Our website will be popular in our target demographic, and will be a springboard to penetrate new markets. Those new markets will increase revenue by 50%.

C. Our site will have at least 40 million views in the first year and be frequently shared across multiple social media platforms.

D. User will enjoy our website and be inspired to purchase products from us, share with friends and family on social media and return to the site frequently.

  Access to the full exam of 1D0-621 with correct answers  


CompTIA - CompTIA A+ - 220-1001 exam dumps

A technician is installing and configuring a storage array on a Windows server. There are four disk slots available, and the only requirement is that the RAID array survives the loss of two drives. Which of the following RAID levels should be used?

A. 1

B. 5

C. 10

D. 60

  Access to the full exam of 220-1001 with correct answers  


CompTIA - CompTIA CASP+ - CAS-003 exam dumps

An organization’s mobile device inventory recently provided notification that a zero-day vulnerability was identified in the code used to control the baseband of the devices. The device manufacturer is expediting a patch, but the rollout will take several months.

Additionally, several mobile users recently returned from an overseas trip and report their phones now contain unknown applications, slowing device performance. Users have been unable to uninstall these applications, which persist after wiping the devices. Which of the following MOST likely occurred and provides mitigation until the patches are released?

A. Unauthentic firmware was installed; disable OTA updates and carrier roaming via MDM

B. Users opened a spear-phishing email; disable third-party application stores and validate all signed code prior to execution

C. An attacker downloaded monitoring applications; perform a full factory reset of the affected devices

D. Users received an improperly encoded emergency broadcast message, leading to an integrity loss condition; disable emergency broadcast messages

  Access to the full exam of CAS-003 with correct answers  




Question page:   1   ...   5     6     7     8     9     10     11     12     13     14     15   ...