Which of the following changes should be made to the security tools to BEST remedy the issue?
A developer downloaded and attempted to install a file transfer application in which the installation package is bundled with acKvare. The next-generation antivirus software prevented the file from executing, but it did not remove the file from the device. Over the next few days, more developers tried to download and...
Which of the following BST describes the result the security learn hopes to accomplish by adding these sources?
A security learn implemented a SCM as part for its security-monitoring program there is a requirement to integrate a number of sources Into the SIEM to provide better context relative to the events being processed. Which of the following BST describes the result the security learn hopes to accomplish by...
Which of the fallowing types of testing docs This describe?
A development team has asked users to conduct testing to ensure an application meets the needs of the business. Which of the fallowing types of testing docs This describe?A . Acceptance testingB . Stress testingC . Regression testingD . Penetration testingView AnswerAnswer: A Explanation: Acceptance testing is a type of...
Which of the following BEST describes a solution that would apply and cause fewer issues during the deployment phase?
A cyber-security analyst is implementing a new network configuration on an existing network access layer to prevent possible physical attacks. Which of the following BEST describes a solution that would apply and cause fewer issues during the deployment phase?A . Implement port security with one MAC address per network port...
Which of the following describes the mam difference between supervised and unsupervised machine-learning algorithms that are used in cybersecurity applications?
Which of the following describes the mam difference between supervised and unsupervised machine-learning algorithms that are used in cybersecurity applications?A . Supervised algorithms can be used to block attacks, while unsupervised algorithms cannot.B . Supervised algorithms require security analyst feedback, while unsupervised algorithms do not.C . Unsupervised algorithms are not...
Which of the following would the software developer MOST likely performed to validate the code poor to pushing it to production?
A software developer is correcting the error-handling capabilities of an application following the initial coding of the fix. Which of the following would the software developer MOST likely performed to validate the code poor to pushing it to production?A . Web-application vulnerability scanB . Static analysisC . Packet inspectionD ....
Which of the following should a security analyst recommend to fix the issue?
An internally developed file-monitoring system identified the following except as causing a program to crash often: Which of the following should a security analyst recommend to fix the issue?A . Open the access.log file ri read/write mode.B . Replace the strcpv function.C . Perform input samtizatonD . Increase the size...
You are a penetration tester who is reviewing the system hardening guidelines for a company.
You are a penetration tester who is reviewing the system hardening guidelines for a company. Hardening guidelines indicate the following. ✑ There must be one primary server or service per device. ✑ Only default port should be used ✑ Non-secure protocols should be disabled. ✑ The corporate internet presence should...
Which of the following environments does the analyst need to examine to continue troubleshooting the event?
A security analyst reviews SIEM logs and discovers the following error event: Which of the following environments does the analyst need to examine to continue troubleshooting the event?A . Proxy serverB . SQL serverC . Windows domain controllerD . WAF applianceE . DNS serverView AnswerAnswer: C Explanation: A Windows domain...
Which of the following techniques is the analyst using?
After examining a header and footer file, a security analyst begins reconstructing files by scanning the raw data bytes of a hard disk and rebuilding them. Which of the following techniques is the analyst using?A . Header analysisB . File carvingC . Metadata analysisD . Data recoveryView AnswerAnswer: B Explanation:...