Which of the following activities would be MOST beneficial to evaluate personnel’s familiarity with incident response procedures?

An organization developed a comprehensive incident response policy. Executive management approved the policy and its associated procedures. Which of the following activities would be MOST beneficial to evaluate personnel’s familiarity with incident response procedures?A . A simulated breach scenario involving the incident response team B. Completion of annual information security...

December 12, 2022 No Comments READ MORE +

Which of the following controls is the MOST appropriate to mitigate risks?

An information security analyst is working with a data owner to identify the appropriate controls to preserve the confidentiality of data within an enterprise environment One of the primary concerns is exfiltration of data by malicious insiders. Which of the following controls is the MOST appropriate to mitigate risks?A ....

December 12, 2022 No Comments READ MORE +

During an investigation, an incident responder intends to recover multiple pieces of digital media.

During an investigation, an incident responder intends to recover multiple pieces of digital media. Before removing the media, the responder should initiate:A . malware scans. B. secure communications. C. chain of custody forms. D. decryption tools.View AnswerAnswer: C

December 12, 2022 No Comments READ MORE +

Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?

A security analyst has received reports of very slow, intermittent access to a public-facing corporate server. Suspecting the system may be compromised, the analyst runs the following commands: Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?A ....

December 12, 2022 No Comments READ MORE +

Which of the following strategies would put the company in the BEST position to achieve the desired recovery time?

A large software company wants to move «s source control and deployment pipelines into a cloud-computing environment. Due to the nature of the business management determines the recovery time objective needs to be within one hour. Which of the following strategies would put the company in the BEST position to...

December 12, 2022 No Comments READ MORE +

Which of the following should be performed NEXT to investigate the availability issue?

A system is experiencing noticeably slow response times, and users are being locked out frequently. An analyst asked for the system security plan and found the system comprises two servers: an application server in the DMZ and a database server inside the trusted domain. Which of the following should be...

December 12, 2022 No Comments READ MORE +

Which of the following MOST likely explains how the clients' accounts were compromised?

Because some clients have reported unauthorized activity on their accounts, a security analyst is reviewing network packet captures from the company's API server. A portion of a capture file is shown below: POST /services/v1_0/Public/Members.svc/soap <s:Envelope+xmlns:s="http://schemas.s/soap/envelope/"><s:Body><GetIPLocation+xmlns="http://tempuri.org/"> <request+xmlns:a="http://schemas.somesite.org"+xmlns:i="http://www.w3.org/2001/XMLSchema-instance"></s:Body></s:Envelope> 192.168.1.22 --api.somesite.com 200 0 1006 1001 0 192.168.1.22 POST /services/v1_0/Public/Members.svc/soap <<a:Password>Password123</a:Password><a:ResetPasswordToken+i:nil="true"/> <a:ShouldImpersonatedAuthenticationBePopulated+i:nil="true"/><a:Username>[email protected]</a:Username></request></Login></s:Body></s:Envelope> 192.168.5.66 --api.somesite.com...

December 12, 2022 No Comments READ MORE +

Which of the following is a security concern when using a PaaS solution?

A product manager is working with an analyst to design a new application that will perform as a data analytics platform and will be accessible via a web browser. The product manager suggests using a PaaS provider to host the application. Which of the following is a security concern when...

December 12, 2022 No Comments READ MORE +

Which of the following is the main concern a security analyst should have with this arrangement?

A small electronics company decides to use a contractor to assist with the development of a new FPGA-based device. Several of the development phases will occur off-site at the contractor's labs. Which of the following is the main concern a security analyst should have with this arrangement?A . Making multiple...

December 11, 2022 No Comments READ MORE +

Which of the following should the security analyst recommend to identity this behavior without alerting any potential malicious actors?

A threat feed notes malicious actors have been infiltrating companies and exfiltration data to a specific set of domains Management at an organization wants to know if it is a victim. Which of the following should the security analyst recommend to identity this behavior without alerting any potential malicious actors?A...

December 11, 2022 No Comments READ MORE +