اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 220 من 1040

كل الأسئلة

An organization discovers unauthorized outbound network connections from a local, internal server to a remote server. A systems administrator compares the hash signatures of the local filesystem against the known-good baseline in order to identify the malicious file that is initiating the outbound connection. The following are the hash signatures of the known-good files:
Which of the following is most likely the malicious file?

الخيارات

  • A passwd.txt
  • B aboutus.html
  • C mysql.exe
  • D httpd.conf

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.