Which of the following types of attacks is MOST likely to occur if an attacker utilizes an HTTPS proxy?
A. Man-in-the-middle
B. Spear phishing
C. Zero day
D. Social engineering
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Reference https://www.securityweek.com/hackers-can-intercept-https-urls-proxy-attacks
QUESTION 124
A technician has a requirement to be able to stage several servers on demand and with little notice. The technician has decided to use cloud technologies. Which of
the following technologies should the technician use in this case?
A. PaaS
B. SaaS
C. IaaS
D. RaaS
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Reference https://rubygarage.org/blog/iaas-vs-paas-vs-saas
QUESTION 125
After successfully removing malware from a user’s Windows OS PC, a technician confirms the machine had been infected for many months. Two weeks after
removing the malware, the malware inadvertently returns. The technician MOST likely forgot to:
A. install antivirus updates
B. disable and enable System Restore
C. update the firewall rules
D. quarantine the system for 30 days