Which of the following controls would have MOST likely prevented this incident?
Data spillage occurred when an employee accidentally emailed a sensitive file to an external recipient. Which of the following controls would have MOST likely prevented this incident?A . SSO B. DLP C. WAF D. VDIView AnswerAnswer: B Explanation: Reference: https://greenlightcorp.com/blog/cyber-security-solutions-data-spillage-and-how-to-create-an-after-incident-to-do-list/
Which of the following rules is the BEST solution?
A security administrator needs to create an IDS rule to alert on FTP login attempts by root . Which of the following rules is the BEST solution? A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: B
Which of the following MOST likely occurred?
A security analyst was alerted to a tile integrity monitoring event based on a change to the vhost-paymonts .conf file. The output of the diff command against the known-good backup reads as follows Which of the following MOST likely occurred?A . The file was altered to accept payments without charging...
Which of the following would be the MOST appropriate to remediate the controller?
An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer...
Which of the following would be the BEST solution to recommend to the director?
A human resources employee sends out a mass email to all employees that contains their personnel records. A security analyst is called in to address the concern of the human resources director on how to prevent this from happening in the future. Which of the following would be the BEST...
Which of the following BEST describes this attack?
A security analyst received a SIEM alert regarding high levels of memory consumption for a critical system. After several attempts to remediate the issue, the system went down. A root cause analysis revealed a bad actor forced the application to not reclaim memory. This caused the system to be depleted...
Which of the following can be inferred from this activity?
An analyst identifies multiple instances of node-to-node communication between several endpoints within the 10.200.2.0/24 network and a user machine at the IP address 10.200.2.5. This user machine at the IP address 10.200.2.5 is also identified as initiating outbound communication during atypical business hours with several IP addresses that have recently...
Which of the following should be used to identify the traffic?
A large amount of confidential data was leaked during a recent security breach. As part of a forensic investigation, the security team needs to identify the various types of traffic that were captured between two compromised devices. Which of the following should be used to identify the traffic?A . CarvingB...
Which of the following would be BEST to implement to alleviate the CISO's concern?
A Chief Information Security Officer (CISO) is concerned the development team, which consists of contractors, has too much access to customer data. Developers use personal workstations, giving the company little to no visibility into the development activities. Which of the following would be BEST to implement to alleviate the CISO's...
Which of the following actions should the technician take to accomplish this task?
A security technician is testing a solution that will prevent outside entities from spoofing the company's email domain, which is comptiA.org. The testing is successful, and the security technician is prepared to fully implement the solution. Which of the following actions should the technician take to accomplish this task? A....