Which step was missed that would have prevented this breach?

A security expert is investigating a breach that resulted in a $32 million loss from customer accounts. Hackers were able to steal API keys and two-factor codes due to a vulnerability that was introduced in a new code a few weeks before the attack . Which step was missed that...

August 13, 2021 No Comments READ MORE +

Which method was used to signal ISE to quarantine the endpoints?

Refer to the exhibit. Rapid Threat Containment using Cisco Secure Network Analytics (Stealthwatch) and ISE detects the threat of malware-infected 802.1x authenticated endpoints and places that endpoint into a quarantine VLAN using Adaptive Network Control policy . Which method was used to signal ISE to quarantine the endpoints?A . SNMPB...

August 13, 2021 No Comments READ MORE +

Which data management process is being used?

An engineer is moving data from NAS servers in different departments to a combined storage database so that the data can be accessed and analyzed by the organization on-demand . Which data management process is being used?A . data clusteringB . data regressionC . data ingestionD . data obfuscationView AnswerAnswer:...

August 13, 2021 No Comments READ MORE +

Which solution should be implemented?

An API developer is improving an application code to prevent DDoS attacks. The solution needs to accommodate instances of a large number of API requests coming for legitimate purposes from trustworthy services . Which solution should be implemented?A . Restrict the number of requests based on a calculation of daily...

August 13, 2021 1 Comment READ MORE +

What results from this script?

Refer to the exhibit. What results from this script?A . Seeds for existing domains are checkedB . A search is conducted for additional seedsC . Domains are compared to seed rulesD . A list of domains as seeds is blockedView AnswerAnswer: B

August 13, 2021 No Comments READ MORE +

What is the difference between process orchestration and automation?

What is the difference between process orchestration and automation?A . Orchestration combines a set of automated tools, while automation is focused on the tools to automate process flows.B . Orchestration arranges the tasks, while automation arranges processes.C . Orchestration minimizes redundancies, while automation decreases the time to recover from redundancies.D...

August 12, 2021 No Comments READ MORE +

Which action prevents this type of attack in the future?

Refer to the exhibit. An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols . Which action prevents this type of attack in the future?A . Use VLANs to segregate zones and the firewall to...

August 12, 2021 No Comments READ MORE +

What is the cause of the issue?

A SOC analyst is notified by the network monitoring tool that there are unusual types of internal traffic on IP subnet 103.861.2117.0/24. The analyst discovers unexplained encrypted data files on a computer system that belongs on that specific subnet . What is the cause of the issue?A . DDoS attackB...

August 12, 2021 No Comments READ MORE +

Having the names of the 3 destination countries and the user's working hours, what must the analyst do next to detect an abnormal behavior?

A SOC team is informed that a UK-based user will be traveling between three countries over the next 60 days. Having the names of the 3 destination countries and the user's working hours, what must the analyst do next to detect an abnormal behavior?A . Create a rule triggered by...

August 12, 2021 No Comments READ MORE +

Which standard must the company follow to safeguard the resting data?

A European-based advertisement company collects tracking information from partner websites and stores it on a local server to provide tailored ads . Which standard must the company follow to safeguard the resting data?A . HIPAAB . PCI-DSSC . Sarbanes-OxleyD . GDPRView AnswerAnswer: D Explanation: Reference: https://www.thesslstore.com/blog/10-data-privacy-and-encryption-laws-every-business-needs-to- know/

August 11, 2021 No Comments READ MORE +