Which of the following is the BEST way to share incident-related artifacts to provide non-repudiation?

Which of the following is the BEST way to share incident-related artifacts to provide non-repudiation?A . Secure email B. Encrypted USB drives C. Cloud containers D. Network foldersView AnswerAnswer: B

December 2, 2022 No Comments READ MORE +

Which of the following is the BEST approach for supply chain assessment when selecting a vendor?

An analyst is participating in the solution analysis process for a cloud-hosted SIEM platform to centralize log monitoring and alerting capabilities in the SOC. Which of the following is the BEST approach for supply chain assessment when selecting a vendor?A . Gather information from providers, including datacenter specifications and copies...

December 2, 2022 No Comments READ MORE +

Which of the following is the BEST technical security control to mitigate this risk?

A security analyst conducted a risk assessment on an organization's wireless network and identified a high-risk element in the implementation of data confidentially protection. Which of the following is the BEST technical security control to mitigate this risk?A . Switch to RADIUS technology B. Switch to TACACS+ technology. C. Switch...

December 2, 2022 No Comments READ MORE +

As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue?

An audit has revealed an organization is utilizing a large number of servers that are running unsupported operating systems. As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue?A . Copies of prior...

December 2, 2022 No Comments READ MORE +

Which of the following would a security engineer recommend to BEST protect sensitive system data from being accessed on mobile devices?

Which of the following would a security engineer recommend to BEST protect sensitive system data from being accessed on mobile devices?A . Use a UEFl boot password. B. Implement a self-encrypted disk. C. Configure filesystem encryption D. Enable Secure Boot using TPMView AnswerAnswer: C

December 2, 2022 No Comments READ MORE +

Which of the following is the BEST example of the level of sophistication this threat actor is using?

A security analyst for a large financial institution is creating a threat model for a specific threat actor that is likely targeting an organization's financial assets. Which of the following is the BEST example of the level of sophistication this threat actor is using?A . Social media accounts attributed to...

December 2, 2022 No Comments READ MORE +

Which of the following remediation actions should the analyst take to implement a vulnerability management process?

A web developer wants to create a new web part within the company website that aggregates sales from individual team sites. A cybersecurity analyst wants to ensure security measurements are implemented during this process. Which of the following remediation actions should the analyst take to implement a vulnerability management process?A...

December 2, 2022 No Comments READ MORE +

Which of the following is MOST likely inhibiting the remediation efforts?

A security analyst at a technology solutions firm has uncovered the same vulnerabilities on a vulnerability scan for a long period of time. The vulnerabilities are on systems that are dedicated to the firm's largest client. Which of the following is MOST likely inhibiting the remediation efforts?A . The parties...

December 2, 2022 No Comments READ MORE +

Welcome to the Enterprise Help Desk System. Please work the ticket escalated to you in the desk ticket queue

HOTSPOT Welcome to the Enterprise Help Desk System. Please work the ticket escalated to you in the desk ticket queue. INSTRUCTIONS Click on me ticket to see the ticket details Additional content is available on tabs within the ticket First, select the appropriate issue from the drop-down menu. Then, select...

December 2, 2022 No Comments READ MORE +

Which of the following MOST likely occurred?

A security analyst was alerted to a tile integrity monitoring event based on a change to the vhost-paymonts .conf file. The output of the diff command against the known-good backup reads as follows Which of the following MOST likely occurred?A . The file was altered to accept payments without charging...

December 2, 2022 No Comments READ MORE +