Which of the following MOST likely happened in this situation?

While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an alert regarding the same indicator. The threat intelligence analyst states that related sites were not visited but were searched for in a search engine. Which of the following MOST likely...

February 13, 2020 No Comments READ MORE +

After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed.

After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed. This is an example...

January 3, 2019 No Comments READ MORE +

Which of the following vulnerabilities has been identified?

After completing a vulnerability scan, the following output was noted: Which of the following vulnerabilities has been identified?A . PKI transfer vulnerability.B . Active Directory encryption vulnerability.C . Web application cryptography vulnerability.D . VPN tunnel vulnerability.View AnswerAnswer: C

December 26, 2018 No Comments READ MORE +

Which of the following software assessment capabilities is the lab performing AND during which phase of the SDLC should this occur?

A software assurance lab is performing a dynamic assessment on an application by automatically generating and inputting different, random data sets to attempt to cause an error/failure condition. Which of the following software assessment capabilities is the lab performing AND during which phase of the SDLC should this occur? (Select...

December 22, 2018 No Comments READ MORE +

Which of the following attacks may be occurring?

A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered for the username: 0xbfff601a. Which of the following attacks may be occurring?A . Buffer overflow attackB . Man-in-the-middle attackC . Smurf attackD . Format string attackE . Denial of service attackView AnswerAnswer:...

December 20, 2018 No Comments READ MORE +

Which of the following should be applied?

An incident response report indicates a virus was introduced through a remote host that was connected to corporate resources. A cybersecurity analyst has been asked for a recommendation to solve this issue. Which of the following should be applied?A . MACB . TAPC . NACD . ACLView AnswerAnswer: C

December 20, 2018 No Comments READ MORE +

Which of the following servers needs further investigation?

A security professional is analyzing the results of a network utilization report. The report includes the following information: Which of the following servers needs further investigation?A . hr.dbprod.01B . R&C . file.srvr.01D . mrktg.file.srvr.02E . web.srvr.03View AnswerAnswer: A

December 3, 2018 No Comments READ MORE +

Which of the following is the BEST way to proceed?

In order to meet regulatory compliance objectives for the storage of PHI, vulnerability scans must be conducted on a continuous basis. The last completed scan of the network returned 5,682 possible vulnerabilities. The Chief Information Officer (CIO) would like to establish a remediation plan to resolve all known issues. Which...

November 29, 2018 No Comments READ MORE +

Which of the following steps should be taken to assist in the development of the disaster recovery plan?

An organization is requesting the development of a disaster recovery plan. The organization has grown and so has its infrastructure. Documentation, policies, and procedures do not exist. Which of the following steps should be taken to assist in the development of the disaster recovery plan?A . Conduct a risk assessment.B...

November 24, 2018 No Comments READ MORE +