Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?

A security analyst reviews the following aggregated output from an Nmap scan and the border firewall ACL: Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?A . PC1B . PC2C . Server1D . Server2E . FirewallView AnswerAnswer: B

July 2, 2022 No Comments READ MORE +

Based on the output, which of the following services should be further tested for vulnerabilities?

A system administrator is doing network reconnaissance of a company’s external network to determine the vulnerability of various services that are running. Sending some sample traffic to the external host, the administrator obtains the following packet capture: Based on the output, which of the following services should be further tested...

July 2, 2022 No Comments READ MORE +

You are a cybersecurity analyst tasked with interpreting scan data from Company A's servers. You must verify the requirements are being met for all of the servers and recommend changes if you find they are not

SIMULATION You are a cybersecurity analyst tasked with interpreting scan data from Company A's servers. You must verify the requirements are being met for all of the servers and recommend changes if you find they are not. The company's hardening guidelines indicate the following: • TLS 1.2 is the only...

July 2, 2022 No Comments READ MORE +

Which of the following types of policies is used to regulate data storage on the network?

Which of the following types of policies is used to regulate data storage on the network?A . PasswordB . Acceptable useC . Account managementD . RetentionView AnswerAnswer: D Explanation: Reference: http://www.css.edu/administration/information-technologies/computing-policies/computer-and-network-policies.html

July 1, 2022 No Comments READ MORE +

Which of the following is the MOST effective way to prevent any newly infected systems from actually encrypting the data on connected network drives while causing the least disruption to normal Internet traffic?

Ransomware is identified on a company's network that affects both Windows and MAC hosts. The command and control channel for encryption for this variant uses TCP ports from 11000 to 65000. The channel goes to good1. Iholdbadkeys.com, which resolves to IP address 72.172.16.2. Which of the following is the MOST...

July 1, 2022 No Comments READ MORE +

Which of the following infrastructure changes should the analyst recommend?

A security analyst needs to reduce the overall attack surface. Which of the following infrastructure changes should the analyst recommend?A . Implement a honeypot.B . Air gap sensitive systems.C . Increase the network segmentation.D . Implement a cloud-based architecture.View AnswerAnswer: C Explanation: Reference: https://www.securitymagazine.com/articles/89283-ways-to-reduce-your-attack-surface

July 1, 2022 No Comments READ MORE +

Which of the following threat modeling methodologies would be the MOST appropriate to use during this analysis?

A company was recently awarded several large government contracts and wants to determine its current risk from one specific APT. Which of the following threat modeling methodologies would be the MOST appropriate to use during this analysis?A . Attack vectorsB . Adversary capabilityC . Diamond Model of Intrusion AnalysisD ....

July 1, 2022 No Comments READ MORE +

A security analyst is building a malware analysis lab. The analyst wants to ensure malicious applications are not capable of escaping the virtual machines and pivoting to other networks.

A security analyst is building a malware analysis lab. The analyst wants to ensure malicious applications are not capable of escaping the virtual machines and pivoting to other networks. To BEST mitigate this risk, the analyst should use.A . an 802.11ac wireless bridge to create an air gap.B . a...

July 1, 2022 No Comments READ MORE +

Which of the following would BEST identify potential indicators of compromise?

An information security analyst observes anomalous behavior on the SCADA devices in a power plant. This behavior results in the industrial generators overheating and destabilizing the power supply. Which of the following would BEST identify potential indicators of compromise?A . Use Burp Suite to capture packets to the SCADA device's...

July 1, 2022 No Comments READ MORE +

Which of the following data privacy standards does this violate?

A pharmaceutical company's marketing team wants to send out notifications about new products to alert users of recalls and newly discovered adverse drug reactions. The team plans to use the names and mailing addresses that users have provided. Which of the following data privacy standards does this violate?A . Purpose...

June 30, 2022 No Comments READ MORE +