Which of the following is the MOST appropriate response?

A hospital’s security team recently determined its network was breached and patient data was accessed by an external entity. The Chief Information Security Officer (CISO) of the hospital approaches the executive management team with this information, reports the vulnerability that led to the breach has already been remediated, and explains...

July 30, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

July 30, 2020 No Comments READ MORE +

Which of the following would BEST prevent the problem from reoccurring in the future?

A user workstation was infected with a new malware variant as a result of a drive-by download. The security administrator reviews key controls on the infected workstation and discovers the following: Which of the following would BEST prevent the problem from reoccurring in the future? (Choose two.)A . Install HIPSB...

July 30, 2020 No Comments READ MORE +

Which of the following cloud-hosting options would BEST meet these needs?

A team is at the beginning stages of designing a new enterprise-wide application. The new application will have a large database and require a capital investment in hardware. The Chief Information Officer (СIO) has directed the team to save money and reduce the reliance on the datacenter, and the vendor...

July 30, 2020 No Comments READ MORE +

Which of the following does the log sample indicate?

A security administrator was informed that a server unexpectedly rebooted. The administrator received an export of syslog entries for analysis: Which of the following does the log sample indicate? (Choose two.)A . A root user performed an injection attack via kernel moduleB . Encrypted payroll data was successfully decrypted by...

July 30, 2020 No Comments READ MORE +

Which of the following tools should be implemented to detect similar attacks?

A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?A . Vulnerability scannerB . TPMC . Host-based firewallD ....

July 29, 2020 No Comments READ MORE +

Which of the following documents would BEST protect the company and ensure timely assistance?

A company is acquiring incident response and forensic assistance from a managed security service provider in the event of a data breach. The company has selected a partner and must now provide required documents to be reviewed and evaluated. Which of the following documents would BEST protect the company and...

July 29, 2020 No Comments READ MORE +

Which of the following should the consultant recommend be performed to evaluate potential risks?

A company has hired an external security consultant to conduct a thorough review of all aspects of corporate security. The company is particularly concerned about unauthorized access to its physical offices resulting in network compromises. Which of the following should the consultant recommend be performed to evaluate potential risks?A ....

July 29, 2020 No Comments READ MORE +

Which of the following should be performed to ensure the users can access the network and meet the company’s security requirements?

A recent assessment identified that several users’ mobile devices are running outdated versions of endpoint security software that do not meet the company’s security policy. Which of the following should be performed to ensure the users can access the network and meet the company’s security requirements?A . Vulnerability assessmentB ....

July 29, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

July 29, 2020 No Comments READ MORE +