Which of the following is the BEST mitigation to prevent unauthorized access?
A SIEM solution alerts a security analyst of a high number of login attempts against the company's webmail portal. The analyst determines the login attempts used credentials from a past data breach. Which of the following is the BEST mitigation to prevent unauthorized access?A . Single sign-onB . Mandatory access...
Which of the following is the main concern a security analyst should have with this arrangement?
A small electronics company decides to use a contractor to assist with the development of a new FPGA-based device. Several of the development phases will occur off-site at the contractor's labs. Which of the following is the main concern a security analyst should have with this arrangement?A . Making multiple...
Which of the following is MOST likely an attack vector that is being utilized as part of the testing and assessment?
An analyst is performing penetration testing and vulnerability assessment activities against a new vehicle automation platform. Which of the following is MOST likely an attack vector that is being utilized as part of the testing and assessment?A . FaaSB . RTOSC . SoCD . GPSE . CAN busView AnswerAnswer: E
For machine learning to be applied effectively toward security analysis automation, it requires .
For machine learning to be applied effectively toward security analysis automation, it requires .A . relevant training data.B . a threat feed APD . a multicore, multiprocessor system.E . anomalous traffic signatures.View AnswerAnswer: A
Which of the following should be done to correct the cause of the vulnerability?
A development team uses open-source software and follows an Agile methodology with two-week sprints. Last month, the security team filed a bug for an insecure version of a common library. The DevOps team updated the library on the server, and then the security team rescanned the server to verify it...
Which of the following sets of attributes BEST illustrates the characteristics of an insider threat from a security perspective?
Which of the following sets of attributes BEST illustrates the characteristics of an insider threat from a security perspective?A . Unauthorized, unintentional, benignB . Unauthorized, intentional, maliciousC . Authorized, intentional, maliciousD . Authorized, unintentional, benignView AnswerAnswer: C Explanation: Reference: https://www.sciencedirect.com/topics/computer-science/insider-attack
Which of the following would explain the difference in results?
A security analyst is trying to determine if a host is active on a network. The analyst first attempts the following: The analyst runs the following command next: Which of the following would explain the difference in results?A . ICMP is being blocked by a firewall.B . The routing tables...
Which of the following commands would MOST likely indicate if the email is malicious?
A user receives a potentially malicious email that contains spelling errors and a PDF document. A security analyst reviews the email and decides to download the attachment to a Linux sandbox for review. Which of the following commands would MOST likely indicate if the email is malicious?A . sha256sum ~/Desktop/file.pdfB...
Which of the following commands would MOST likely provide the needed information?
An information security analyst is compiling data from a recent penetration test and reviews the following output: The analyst wants to obtain more information about the web-based services that are running on the target. Which of the following commands would MOST likely provide the needed information?A . ping -t 10.79.95.173.rdns.datacenters.comB...
Which of the following roles is ultimately responsible for determining the classification levels assigned to specific data sets?
Which of the following roles is ultimately responsible for determining the classification levels assigned to specific data sets?A . Data custodianB . Data ownerC . Data processorD . Senior managementView AnswerAnswer: B Explanation: Reference: https://www.pearsonitcertification.com/articles/article.aspx?p=2731933&seqNum=3