Which of the following is the BEST course of action based on the above warning and code snippet?

After scanning the main company’s website with the OWASP ZAP tool, a cybersecurity analyst is reviewing the following warning: The analyst reviews a snippet of the offending code: Which of the following is the BEST course of action based on the above warning and code snippet?A . The analyst should...

August 26, 2018 No Comments READ MORE +

Which of the following recommendations would meet both the mobile data protection efforts and the business requirements described in this scenario?

A cybersecurity analyst is reviewing the current BYOD security posture. The users must be able to synchronize their calendars, email, and contacts to a smartphone or other personal device. The recommendation must provide the most flexibility to users. Which of the following recommendations would meet both the mobile data protection...

August 16, 2018 No Comments READ MORE +

Which of the following documents should include these details?

A company that is hiring a penetration tester wants to exclude social engineering from the list of authorized activities. Which of the following documents should include these details?A . Acceptable use policyB . Service level agreementC . Rules of engagementD . Memorandum of understandingE . Master service agreementView AnswerAnswer: C

August 7, 2018 No Comments READ MORE +

Which of the following may be occurring?

File integrity monitoring states the following files have been changed without a written request or approved change. The following change has been made: chmod 777 CRv /usr Which of the following may be occurring?A . The ownership pf /usr has been changed to the current user.B . Administrative functions have...

August 2, 2018 No Comments READ MORE +

Which of the following techniques would BEST help the analyst accomplish this goal?

An analyst has initiated an assessment of an organization’s security posture. As a part of this review, the analyst would like to determine how much information about the organization is exposed externally. Which of the following techniques would BEST help the analyst accomplish this goal? (Select two.)A . FingerprintingB ....

July 27, 2018 No Comments READ MORE +

Which of the following combinations BEST describes the situation and recommendations to be made for this situation?

A cybersecurity analyst is retained by a firm for an open investigation. Upon arrival, the cybersecurity analyst reviews several security logs. Given the following snippet of code: Which of the following combinations BEST describes the situation and recommendations to be made for this situation?A . The cybersecurity analyst has discovered...

July 15, 2018 No Comments READ MORE +

Which of the following steps should be taken to prevent further disclosure of information about the breach?

Law enforcement has contacted a corporation’s legal counsel because correlated data from a breach shows the organization as the common denominator from all indicators of compromise. An employee overhears the conversation between legal counsel and law enforcement, and then posts a comment about it on social media. The media then...

July 5, 2018 No Comments READ MORE +

Which of the following should the analyst recommend to the company officer?

A security analyst is adding input to the incident response communication plan. A company officer has suggested that if a data breach occurs, only affected parties should be notified to keep an incident from becoming a media headline. Which of the following should the analyst recommend to the company officer?A...

July 1, 2018 No Comments READ MORE +

Which of the following items represents a document that includes detailed information on when an incident was detected, how impactful the incident was, and how it was remediated, in addition to incident response effectiveness and any identified gaps needing improvement?

Which of the following items represents a document that includes detailed information on when an incident was detected, how impactful the incident was, and how it was remediated, in addition to incident response effectiveness and any identified gaps needing improvement?A . Forensic analysis reportB . Chain of custody reportC ....

June 27, 2018 No Comments READ MORE +

Which of the following software development best practices would have helped prevent this issue?

External users are reporting that a web application is slow and frequently times out when attempting to submit information. Which of the following software development best practices would have helped prevent this issue?A . Stress testingB . Regression testingC . Input validationD . FuzzingView AnswerAnswer: A

June 19, 2018 No Comments READ MORE +