Which action will improve workflow automation?
An organization is using a PKI management server and a SOAR platform to manage the certificate lifecycle. The SOAR platform queries a certificate management tool to check all endpoints for SSL certificates that have either expired or are nearing expiration. Engineers are struggling to manage problematic certificates outside of PKI...
Which bash command will print all lines from the “colors.txt” file containing the non case-sensitive pattern “Yellow”?
Which bash command will print all lines from the “colors.txt” file containing the non case-sensitive pattern “Yellow”?A . grep -i “yellow” colors.txtB . locate “yellow” colors.txtC . locate -i “Yellow” colors.txtD . grep “Yellow” colors.txtView AnswerAnswer: A
Where are the browser page rendering permissions displayed?
Refer to the exhibit. Where are the browser page rendering permissions displayed?A . X-Frame-OptionsB . X-XSS-ProtectionC . Content-TypeD . Cache-ControlView AnswerAnswer: C
Where is the MIME type that should be followed indicated?
Refer to the exhibit. Where is the MIME type that should be followed indicated?A . x-test-debugB . strict-transport-securityC . x-xss-protectionD . x-content-type-optionsView AnswerAnswer: A
Which type of compromise is occurring?
Refer to the exhibit. An engineer is investigating a case with suspicious usernames within the active directory. After the engineer investigates and cross-correlates events from other sources, it appears that the 2 users are privileged, and their creation date matches suspicious network traffic that was initiated from the internal network...
How should the workflow be improved to resolve these issues?
An engineer implemented a SOAR workflow to detect and respond to incorrect login attempts and anomalous user behavior. Since the implementation, the security team has received dozens of false positive alerts and negative feedback from system administrators and privileged users. Several legitimate users were tagged as a threat and their...
A SOC analyst detected a ransomware outbreak in the organization coming from a malicious email attachment. Affected parties are notified, and the incident response team is assigned to the case. According to the NIST incident response handbook, what is the next step in handling the incident?
A SOC analyst detected a ransomware outbreak in the organization coming from a malicious email attachment. Affected parties are notified, and the incident response team is assigned to the case. According to the NIST incident response handbook, what is the next step in handling the incident?A . Create a follow-up...
What are the actions a security manager should take?
A security manager received an email from an anomaly detection service, that one of their contractors has downloaded 50 documents from the company’s confidential document management folder using a company- owned asset al039-ice-4ce687TL0500. A security manager reviewed the content of downloaded documents and noticed that the data affected is from...
Which asset has the highest risk value?
Refer to the exhibit. Which asset has the highest risk value?A . serversB . websiteC . payment processD . secretary workstationView AnswerAnswer: C
Which compliance regulations must the audit apply to the company?
An audit is assessing a small business that is selling automotive parts and diagnostic services. Due to increased customer demands, the company recently started to accept credit card payments and acquired a POS terminal . Which compliance regulations must the audit apply to the company?A . HIPAAB . FISMAC ....