Which of the following would BEST accomplish this goal?
A cybersecurity analyst has access to several threat feeds and wants to organize them while simultaneously comparing intelligence against network traffic. Which of the following would BEST accomplish this goal?A . Continuous integration and deployment B. Automation and orchestration C. Static and dynamic analysis D. Information sharing and analysisView AnswerAnswer:...
When of the following would be the BEST integration option for the service?
An executive assistant wants to onboard a new cloud based product to help with business analytics and dashboarding. When of the following would be the BEST integration option for the service?A . Manually log in to the service and upload data files on a regular basis. B. Have the internal...
Which of the following commands would work BEST to achieve the desired result?
A security analyst is reviewing the logs from an internal chat server. The chat.log file is too large to review manually, so the analyst wants to create a shorter log file that only includes lines associated with a user demonstrating anomalous activity. Below is a snippet of the log: Which...
Which of the following describes the type of control that is being used?
A developer wrote a script to make names and other Pll data unidentifiable before loading a database export into the testing system. Which of the following describes the type of control that is being used?A . Data encoding B. Data masking C. Data loss prevention D. Data classificationView AnswerAnswer: C
Which of the following commands should the administrator run NEXT to further analyze the compromised system?
A security analyst is investigating a compromised Linux server. The analyst issues the ps command and receives the following output. Which of the following commands should the administrator run NEXT to further analyze the compromised system?A . strace /proc/1301 B. rpm -V openash-server C. /bin/la -1 /proc/1301/exe D. kill -9...
Which of the following should be considered FIRST prior to disposing of the electronic data?
An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets. Which of the following should be considered FIRST prior to disposing of the electronic data?A . Sanitization policy B. Data sovereignty C. Encryption policy D. Retention standardsView AnswerAnswer: D
Which of the following BEST describes this test?
As part of an exercise set up by the information security officer, the IT staff must move some of the network systems to an off-site facility and redeploy them for testing. All staff members must ensure their respective systems can power back up and match their gold image. If they...
Which of the following will remediate this software vulnerability?
A security analyst is reviewing a web application. If an unauthenticated user tries to access a page in the application, the user is redirected to the login page. After successful authentication, the user is then redirected back to the original page. Some users have reported receiving phishing emails with a...
Which of the following would BEST accomplish this goal?
A security team wants to make SaaS solutions accessible from only the corporate campus Which of the following would BEST accomplish this goal?A . Geofencing B. IP restrictions C. Reverse proxy D. Single sign-onView AnswerAnswer: A Explanation: Reference: https://bluedot.io/library/what-is-geofencing/
Which of the following data privacy standards does this violate?
A pharmaceutical company's marketing team wants to send out notifications about new products to alert users of recalls and newly discovered adverse drug reactions. The team plans to use the names and mailing addresses that users have provided. Which of the following data privacy standards does this violate?A . Purpose...