Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CIW 1D0-61A Exam - Topic 7 Question 74 Discussion

Actual exam question for CIW's 1D0-61A exam
Question #: 74
Topic #: 7
[All 1D0-61A Questions]

Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Berry
5 months ago
Strong encryption won't help if the system is already compromised!
upvoted 0 times
...
Francene
5 months ago
Wait, are we sure an attacker is really in control?
upvoted 0 times
...
Joni
5 months ago
I think shutting down the computer is too drastic.
upvoted 0 times
...
Renea
5 months ago
Running anti-virus is a must too!
upvoted 0 times
...
Lyla
6 months ago
Definitely unplug the network cable first!
upvoted 0 times
...
Lisha
6 months ago
Enabling encryption sounds useful, but I don't think it addresses the immediate threat Gabby is facing right now.
upvoted 0 times
...
Carman
6 months ago
Running anti-virus software seems like a good idea, but I feel like it might be too late if the attacker already has control.
upvoted 0 times
...
Yong
6 months ago
I think we practiced a similar question where disconnecting from the network was emphasized as a priority to stop data exfiltration.
upvoted 0 times
...
Sharika
6 months ago
I remember discussing how shutting down the computer might prevent further damage, but I'm not sure if it's the best first step.
upvoted 0 times
...
Leslie
6 months ago
Running antivirus is a good idea, but I'd want to make sure I'm not just masking the problem. Unplugging the network seems like the most prudent move.
upvoted 0 times
...
Theola
6 months ago
I'm a bit unsure here. Enabling encryption could help protect the data, but might not address the root issue.
upvoted 0 times
...
Lashawnda
6 months ago
Disabling the network connection seems like a good first step to isolate the system and prevent further compromise.
upvoted 0 times
...
Viola
6 months ago
Okay, let's see. Shutting down the computer might be the safest option to stop any further damage.
upvoted 0 times
...
Ty
6 months ago
Hmm, this seems like a tricky one. I'll need to think it through carefully.
upvoted 0 times
...
Tarra
7 months ago
Okay, I think I've got a handle on this. Creating an app permission policy and assigning it to the users should do the trick. That should effectively block the private chat feature for those temporary employees.
upvoted 0 times
...
Gladys
7 months ago
I'm a bit confused by all the different security controls mentioned in the question. I'll need to review my notes on the CIS Controls to make sure I understand which one encompasses all of those specific activities. Gotta be careful on this one.
upvoted 0 times
...
Glory
7 months ago
From what I recall, the "Security Over Connectivity" policy sounds like it would block a lot of traffic, which isn't what they want right now. Maybe "Balanced Security and Connectivity" is safer?
upvoted 0 times
...
Kasandra
7 months ago
I'm a bit confused by the different security domains and requirements for traffic segmentation. I'll need to carefully review the details to determine the best Aviatrix solution.
upvoted 0 times
...
Lauran
11 months ago
Option D) Unplug the network cable? That's like putting a bandage on a gunshot wound. But hey, at least you'll have a nice coaster for your coffee mug.
upvoted 0 times
...
Kris
11 months ago
A) Shut down the computer. Can't hack what's not running, am I right?
upvoted 0 times
Sueann
10 months ago
C) Run anti-virus software on all disks associated with this system.
upvoted 0 times
...
Zack
10 months ago
B) Enable strong encryption on all files on the hard disk.
upvoted 0 times
...
Staci
11 months ago
A) Shut down the computer.
upvoted 0 times
...
...
Tamesha
11 months ago
C) Run anti-virus software on all disks associated with this system. Gotta catch that nasty malware before it spreads any further.
upvoted 0 times
Barney
10 months ago
D) Unplug the computer network cable and/or disable the computer's wireless NIC.
upvoted 0 times
...
Chaya
10 months ago
B) Enable strong encryption on all files on the hard disk.
upvoted 0 times
...
Arthur
11 months ago
A) Shut down the computer.
upvoted 0 times
...
...
Verona
12 months ago
B) Enable strong encryption on all files on the hard disk. That'll keep the attacker from accessing the data, even if they've gained control of the system.
upvoted 0 times
Desire
11 months ago
D) Unplug the computer network cable and/or disable the computer's wireless NIC.
upvoted 0 times
...
Lashaunda
11 months ago
B) Enable strong encryption on all files on the hard disk.
upvoted 0 times
...
Shelba
11 months ago
A) Shut down the computer.
upvoted 0 times
...
...
Lashawnda
1 year ago
I disagree, I think Gabby should run anti-virus software to try to remove the attacker's control.
upvoted 0 times
...
Rozella
1 year ago
D) Unplug the computer network cable and/or disable the computer's wireless NIC. That's the best way to isolate the system and prevent further compromise.
upvoted 0 times
Patria
11 months ago
User 2
upvoted 0 times
...
Ula
11 months ago
User 1
upvoted 0 times
...
...
Rima
1 year ago
I agree with Sharika, shutting down the computer is the best option to prevent further damage.
upvoted 0 times
...
Sharika
1 year ago
I think Gabby should shut down the computer.
upvoted 0 times
...

Save Cancel