Which of the following is an advantage of SOAR over SIEM?
Which of the following is an advantage of SOAR over SIEM?A . SOAR is much less expensive. B. SOAR reduces the amount of human intervention required. C. SOAR can aggregate data from many sources. D. SOAR uses more robust encryption protocols.View AnswerAnswer: B Explanation: SOAR (Security Orchestration, Automation, and Response)...
Which of the following generated the above output?
A security analyst is reviewing the output of tcpdump to analyze the type of activity on a packet capture: Which of the following generated the above output?A . A port scan B. A TLS connection C. A vulnerability scan D. A ping sweepView AnswerAnswer: B Explanation: A port scan generated...
Which Of the following actions would be BEST for the analyst to recommend to the asset owners to secure the devices from further exploitation?
An analyst receives an alert from the continuous-monitoring solution about unauthorized changes to the firmware versions on several field devices. The asset owners confirm that no firmware version updates were performed by authorized technicians, and customers have not reported any performance issues or outages. Which Of the following actions would...
Which of the following are considered PII by themselves? (Select TWO).
Which of the following are considered PII by themselves? (Select TWO).A . Government ID B. Job title C. Employment start date D. Birth certificate E. Employer address F. Mother's maiden nameView AnswerAnswer: A,D Explanation: PII (Personally Identifiable Information) is any information that can be used to identify, contact, or locate...
Which of the following is the BEST option to protect a web application against CSRF attacks?
Which of the following is the BEST option to protect a web application against CSRF attacks?A . Update the web application to the latest version. B. Set a server-side rate limit for CSRF token generation. C. Avoid the transmission of CSRF tokens using cookies. D. Configure the web application to...
Which of the following activities best describes the process the development team is initiating?
A development team recently released a new version of a public-facing website for testing prior to production. The development team is soliciting the help of various teams to validate the functionality of the website due to its high visibility. Which of the following activities best describes the process the development...
Which of the following configuration changes would improve security and help prevent this from occurring?
Members of the sales team are using email to send sensitive client lists with contact information to their personal accounts. The company's AUP and code of conduct prohibits this practice. Which of the following configuration changes would improve security and help prevent this from occurring?A . Configure the DLP transport...
Which of the following is an appropriate solution to control the sensitive data that is being stored in the cloud?
The management team has asked a senior security engineer to explore DLP security solutions for the company's growing use of cloud-based storage. Which of the following is an appropriate solution to control the sensitive data that is being stored in the cloud?A . NAC B. IPS C. CASB D. WAFView...
Which of the following would be an appropriate course of action?
A Chief Information Security Officer (CISO) is concerned about new privacy regulations that apply to the company. The CISO has tasked a security analyst with finding the proper control functions to verify that a user's data is not altered without the user's consent. Which of the following would be an...
A code review reveals a web application is using lime-based cookies for session management. This is a security concern because lime-based cookies are easy to:
A code review reveals a web application is using lime-based cookies for session management. This is a security concern because lime-based cookies are easy to:A . parameterize. B. decode. C. guess. D. decrypt.View AnswerAnswer: B Explanation: Lime-based cookies are a type of cookies that use lime encoding to store data...