Which of the following Is MOST likely occurring?
A security analyst is reviewing the following server statistics: Which of the following Is MOST likely occurring?A . Race condition B. Privilege escalation C. Resource exhaustion D. VM escapeView AnswerAnswer: C Explanation: Resource exhaustion occurs when a system runs out of resources such as memory, CPU, disk space, or network...
Which of the following BEST describes what the CIS wants to purchase?
The Chief Information Security Officer (CISO) of a large financial institution is seeking a solution that will block a predetermined set of data points from being transferred or downloaded by employees. The CISO also wants to track the data assets by name, type, content, or data profile. Which of the...
Which of the following would be the BEST way to locate this issue?
During an audit several customer order forms were found to contain inconsistencies between the actual price of an item and the amount charged to the customer Further investigation narrowed the cause of the issue to manipulation of the public-facing web form used by customers to order products . Which of...
Which of the following is the GREATEST security concern?
During a routine review of service restarts a security analyst observes the following in a server log: Which of the following is the GREATEST security concern?A . The daemon's binary was AChanged B. Four consecutive days of monitoring are skipped in the tog C. The process identifiers for the running...
Which of the following BEST Describes this type of actor?
White reviewing incident reports from the previous night, a security analyst notices the corporate websites were defaced with po mcai propaganda. Which of the following BEST Describes this type of actor?A . Hacktivist B. Nation-state C. insider threat D. Organized crimeView AnswerAnswer: A Explanation: A hacktivist is a type of...
Which of the following are the MOST secure states for the certificate authority server when it is not in use?
While implementing a PKI for a company, a security analyst plans to utilize a dedicated server as the certAcate authority that is only used to sign intermediate certificates. Which of the following are the MOST secure states for the certificate authority server when it is not in use? (Select TWO)A...
After looking at the above communication, which of the following should the technician recommend to the security team to prevent exposure of sensitive information and reduce the risk of corporate data being stored on non-corporate assets?
A technician working at company.com received the following email: After looking at the above communication, which of the following should the technician recommend to the security team to prevent exposure of sensitive information and reduce the risk of corporate data being stored on non-corporate assets?A . Forwarding of corporate email...
Which of the following would allow the analyst to perform the task?
A security analyst needs to provide a copy of a hard drive for forensic analysis. Which of the following would allow the analyst to perform the task? A) B) C) D) A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: C Explanation: Option C shows...
Which of the following should the analyst recommend?
A company's Chief Information Officer wants to use a CASB solution to ensure policies are being met during cloud access. Due to the nature of the company's business and risk appetite, the management team elected to not store financial information in the cloud. A security analyst needs to recommend a...
Which of the following exercises would be the best approach?
A company is aiming to test a new incident response plan. The management team has made it clear that the initial test should have no impact on the environment. The company has limited resources to support testing. Which of the following exercises would be the best approach?A . Tabletop scenarios...