Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

January 17, 2020 No Comments READ MORE +

Which of the following mitigation strategies should an information security manager recommend to the data owner?

Two new technical SMB security settings have been enforced and have also become policies that increase secure communications. Network Client: Digitally sign communication Network Server: Digitally sign communication A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect...

January 17, 2020 No Comments READ MORE +

Which of the following types of attack vector did the penetration tester use?

An internal penetration tester was assessing a recruiting page for potential issues before it was pushed to the production website. The penetration tester discovers an issue that must be corrected before the page goes live. The web host administrator collects the log files below and gives them to the development...

January 17, 2020 No Comments READ MORE +

Which of the following BEST meets this objective?

The Chief Information Security Officer (CISO) for an organization wants to develop custom IDS rulesets faster, prior to new rules being released by IDS vendors. Which of the following BEST meets this objective?A . Identify a third-party source for IDS rules and change the configuration on the applicable IDSs to...

January 17, 2020 No Comments READ MORE +

Which of the following should the analyst use to confirm this suspicion?

A forensics analyst suspects that a breach has occurred. Security logs show the company’s OS patch system may be compromised, and it is serving patches that contain a zero-day exploit and backdoor. The analyst extracts an executable file from a packet capture of communication between a client computer and the...

January 16, 2020 No Comments READ MORE +

Which of the following commands would have provided this output?

A security consultant is attempting to discover if the company is utilizing databases on client machines to store the customer data. The consultant reviews the following information: Which of the following commands would have provided this output?A . arp -sB . netstat -aC . ifconfig -arpD . sqlmap -wView AnswerAnswer:...

January 16, 2020 No Comments READ MORE +

Which of the following would BEST secure the web server until the replacement web server is ready?

A recent penetration test identified that a web server has a major vulnerability. The web server hosts a critical shipping application for the company and requires 99.99% availability. Attempts to fix the vulnerability would likely break the application. The shipping application is due to be replaced in the next three...

January 16, 2020 No Comments READ MORE +

Which of the following controls would BEST mitigate the identified vulnerability?

A security architect is implementing security measures in response to an external audit that found vulnerabilities in the corporate collaboration tool suite. The report identified the lack of any mechanism to provide confidentiality for electronic correspondence between users and between users and group mailboxes. Which of the following controls would...

January 16, 2020 No Comments READ MORE +

Which of the following tools should be implemented to detect similar attacks?

A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?A . Vulnerability scannerB . TPMC . Host-based firewallD ....

January 16, 2020 No Comments READ MORE +

Which of the following types of attack vector did the penetration tester use?

An internal penetration tester was assessing a recruiting page for potential issues before it was pushed to the production website. The penetration tester discovers an issue that must be corrected before the page goes live. The web host administrator collects the log files below and gives them to the development...

January 7, 2019 No Comments READ MORE +