New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CIW 1D0-61A Exam - Topic 7 Question 74 Discussion

Actual exam question for CIW's 1D0-61A exam
Question #: 74
Topic #: 7
[All 1D0-61A Questions]

Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Berry
3 months ago
Strong encryption won't help if the system is already compromised!
upvoted 0 times
...
Francene
3 months ago
Wait, are we sure an attacker is really in control?
upvoted 0 times
...
Joni
4 months ago
I think shutting down the computer is too drastic.
upvoted 0 times
...
Renea
4 months ago
Running anti-virus is a must too!
upvoted 0 times
...
Lyla
4 months ago
Definitely unplug the network cable first!
upvoted 0 times
...
Lisha
4 months ago
Enabling encryption sounds useful, but I don't think it addresses the immediate threat Gabby is facing right now.
upvoted 0 times
...
Carman
4 months ago
Running anti-virus software seems like a good idea, but I feel like it might be too late if the attacker already has control.
upvoted 0 times
...
Yong
5 months ago
I think we practiced a similar question where disconnecting from the network was emphasized as a priority to stop data exfiltration.
upvoted 0 times
...
Sharika
5 months ago
I remember discussing how shutting down the computer might prevent further damage, but I'm not sure if it's the best first step.
upvoted 0 times
...
Leslie
5 months ago
Running antivirus is a good idea, but I'd want to make sure I'm not just masking the problem. Unplugging the network seems like the most prudent move.
upvoted 0 times
...
Theola
5 months ago
I'm a bit unsure here. Enabling encryption could help protect the data, but might not address the root issue.
upvoted 0 times
...
Lashawnda
5 months ago
Disabling the network connection seems like a good first step to isolate the system and prevent further compromise.
upvoted 0 times
...
Viola
5 months ago
Okay, let's see. Shutting down the computer might be the safest option to stop any further damage.
upvoted 0 times
...
Ty
5 months ago
Hmm, this seems like a tricky one. I'll need to think it through carefully.
upvoted 0 times
...
Tarra
5 months ago
Okay, I think I've got a handle on this. Creating an app permission policy and assigning it to the users should do the trick. That should effectively block the private chat feature for those temporary employees.
upvoted 0 times
...
Gladys
5 months ago
I'm a bit confused by all the different security controls mentioned in the question. I'll need to review my notes on the CIS Controls to make sure I understand which one encompasses all of those specific activities. Gotta be careful on this one.
upvoted 0 times
...
Glory
5 months ago
From what I recall, the "Security Over Connectivity" policy sounds like it would block a lot of traffic, which isn't what they want right now. Maybe "Balanced Security and Connectivity" is safer?
upvoted 0 times
...
Kasandra
5 months ago
I'm a bit confused by the different security domains and requirements for traffic segmentation. I'll need to carefully review the details to determine the best Aviatrix solution.
upvoted 0 times
...
Lauran
10 months ago
Option D) Unplug the network cable? That's like putting a bandage on a gunshot wound. But hey, at least you'll have a nice coaster for your coffee mug.
upvoted 0 times
...
Kris
10 months ago
A) Shut down the computer. Can't hack what's not running, am I right?
upvoted 0 times
Sueann
9 months ago
C) Run anti-virus software on all disks associated with this system.
upvoted 0 times
...
Zack
9 months ago
B) Enable strong encryption on all files on the hard disk.
upvoted 0 times
...
Staci
9 months ago
A) Shut down the computer.
upvoted 0 times
...
...
Tamesha
10 months ago
C) Run anti-virus software on all disks associated with this system. Gotta catch that nasty malware before it spreads any further.
upvoted 0 times
Barney
9 months ago
D) Unplug the computer network cable and/or disable the computer's wireless NIC.
upvoted 0 times
...
Chaya
9 months ago
B) Enable strong encryption on all files on the hard disk.
upvoted 0 times
...
Arthur
9 months ago
A) Shut down the computer.
upvoted 0 times
...
...
Verona
10 months ago
B) Enable strong encryption on all files on the hard disk. That'll keep the attacker from accessing the data, even if they've gained control of the system.
upvoted 0 times
Desire
9 months ago
D) Unplug the computer network cable and/or disable the computer's wireless NIC.
upvoted 0 times
...
Lashaunda
9 months ago
B) Enable strong encryption on all files on the hard disk.
upvoted 0 times
...
Shelba
10 months ago
A) Shut down the computer.
upvoted 0 times
...
...
Lashawnda
11 months ago
I disagree, I think Gabby should run anti-virus software to try to remove the attacker's control.
upvoted 0 times
...
Rozella
11 months ago
D) Unplug the computer network cable and/or disable the computer's wireless NIC. That's the best way to isolate the system and prevent further compromise.
upvoted 0 times
Patria
9 months ago
User 2
upvoted 0 times
...
Ula
10 months ago
User 1
upvoted 0 times
...
...
Rima
11 months ago
I agree with Sharika, shutting down the computer is the best option to prevent further damage.
upvoted 0 times
...
Sharika
11 months ago
I think Gabby should shut down the computer.
upvoted 0 times
...

Save Cancel