Which of the following should the security analyst focus on to remedy the existing reported problems?
An application development company released a new version of its software to the public. A few days after the release, the company is notified by end users that the application is notably slower, and older security bugs have reappeared in the new release. The development team has decided to include...
Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)
Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)A . PatchingB . NIDSC . SegmentationD . Disabling unused servicesE . FirewallingView AnswerAnswer: C,D
Which of the following should a security technician implement to drop the traffic going to the command and control server and still be able to identify the infected host through firewall logs?
A computer has been infected with a virus and is sending out a beacon to command and control server through an unknown service . Which of the following should a security technician implement to drop the traffic going to the command and control server and still be able to identify...
Which of the following techniques would BEST help the analyst accomplish this goal?
An analyst has initiated an assessment of an organization’s security posture. As a part of this review, the analyst would like to determine how much information about the organization is exposed externally . Which of the following techniques would BEST help the analyst accomplish this goal? (Select two.)A . FingerprintingB...
Which of the following BEST describes the type of threat in this situation?
An HR employee began having issues with a device becoming unresponsive after attempting to open an email attachment. When informed, the security analyst became suspicious of the situation, even though there was not any unusual behavior on the IDS or any alerts from the antivirus software . Which of the...
Which of the following policies BEST explains the purpose of a data ownership policy?
Which of the following policies BEST explains the purpose of a data ownership policy?A . The policy should describe the roles and responsibilities between users and managers, and the management of specific data types.B . The policy should establish the protocol for retaining information types based on regulatory or business...
Which of the following vulnerabilities has been identified?
After completing a vulnerability scan, the following output was noted: Which of the following vulnerabilities has been identified?A . PKI transfer vulnerability.B . Active Directory encryption vulnerability.C . Web application cryptography vulnerability.D . VPN tunnel vulnerability.View AnswerAnswer: C
Which of the following is MOST effective for correlation analysis by log for threat management?
Which of the following is MOST effective for correlation analysis by log for threat management?A . PCAPB . SCAPC . IPSD . SIEMView AnswerAnswer: D
Which of the following should be applied?
An incident response report indicates a virus was introduced through a remote host that was connected to corporate resources. A cybersecurity analyst has been asked for a recommendation to solve this issue . Which of the following should be applied?A . MACB . TAPC . NACD . ACLView AnswerAnswer: C
Which of the following has occurred on the workstation?
An analyst is observing unusual network traffic from a workstation. The workstation is communicating with a known malicious site over an encrypted tunnel. A full antivirus scan with an updated antivirus signature file does not show any sign of infection . Which of the following has occurred on the workstation?A...