Which of the following recommendations would meet both the mobile data protection efforts and the business requirements described in this scenario?

A cybersecurity analyst is reviewing the current BYOD security posture. The users must be able to synchronize their calendars, email, and contacts to a smartphone or other personal device. The recommendation must provide the most flexibility to users. Which of the following recommendations would meet both the mobile data protection...

February 16, 2020 No Comments READ MORE +

Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?

Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?A . Blue team training exercisesB . Technical control reviewsC . White team training exercisesD . Operational control reviewsView AnswerAnswer: A

February 15, 2020 No Comments READ MORE +

Which of the following threats did the engineer MOST likely uncover?

A reverse engineer was analyzing malware found on a retailer’s network and found code extracting track data in memory. Which of the following threats did the engineer MOST likely uncover?A . POS malwareB . RootkitC . Key loggerD . RansomwareView AnswerAnswer: A

February 15, 2020 No Comments READ MORE +

Which of the following is MOST likely to drive up the incident’s impact assessment?

During a routine review of firewall logs, an analyst identified that an IP address from the organization’s server subnet had been connecting during nighttime hours to a foreign IP address, and had been sending between 150 and 500 megabytes of data each time. This had been going on for approximately...

February 15, 2020 No Comments READ MORE +

Which of the following recommendations will BEST prevent the same attack from occurring in the future?

An organization has recently recovered from an incident where a managed switch had been accessed and reconfigured without authorization by an insider. The incident response team is working on developing a lessons learned report with recommendations. Which of the following recommendations will BEST prevent the same attack from occurring in...

February 15, 2020 No Comments READ MORE +

Which of the following commands would a security analyst use to make a copy of an image for forensics use?

Which of the following commands would a security analyst use to make a copy of an image for forensics use?A . ddB . wgetC . touchD . rmView AnswerAnswer: A

February 14, 2020 No Comments READ MORE +

Which of the following compensating controls would help prevent this from reoccurring?

A system administrator who was using an account with elevated privileges deleted a large amount of log files generated by a virtual hypervisor in order to free up disk space. These log files are needed by the security team to analyze the health of the virtual machines. Which of the...

February 14, 2020 No Comments READ MORE +

Which of the following vulnerability options would BEST create the process requirements?

A security analyst is creating baseline system images to remediate vulnerabilities found in different operating systems. Each image needs to be scanned before it is deployed. The security analyst must ensure the configurations match industry standard benchmarks and the process can be repeated frequently. Which of the following vulnerability options...

February 14, 2020 No Comments READ MORE +

Which of the following software development best practices would have helped prevent this issue?

External users are reporting that a web application is slow and frequently times out when attempting to submit information. Which of the following software development best practices would have helped prevent this issue?A . Stress testingB . Regression testingC . Input validationD . FuzzingView AnswerAnswer: A

February 14, 2020 No Comments READ MORE +

Which of the following sources would be used to evaluate which network service was interrupted?

A technician is running an intensive vulnerability scan to detect which ports are open to exploit. During the scan, several network services are disabled and production is affected. Which of the following sources would be used to evaluate which network service was interrupted?A . SyslogB . Network mappingC . Firewall...

February 14, 2020 No Comments READ MORE +