Which of the following is the MOST proactive tool or technique that feeds incident response capabilities?
A Chief Information Security Officer (CISO) wants to upgrade an organization's security posture by improving proactive activities associated with attacks from internal and external threats. Which of the following is the MOST proactive tool or technique that feeds incident response capabilities?A . Development of a hypothesis as part of threat...
Which of the following technologies can be used to house the entropy keys for task encryption on desktops and laptops?
Which of the following technologies can be used to house the entropy keys for task encryption on desktops and laptops?A . Self-encrypting driveB . Bus encryptionC . TPMD . HSMView AnswerAnswer: A
Which of the following would BEST protect the sensitivity of this data while still allowing the team to perform the testing?
A development team is testing a new application release. The team needs to import existing client PHI data records from the production environment to the test environment to test accuracy and functionality. Which of the following would BEST protect the sensitivity of this data while still allowing the team to...
Which of the following would BEST prevent future attacks?
A company recently experienced multiple DNS DDoS attacks, and the information security analyst must provide a DDoS solution to deploy in the company's datacenter. Which of the following would BEST prevent future attacks?A . Configure a sinkhole on the router.B . Buy a UTM to block the number of requests.C...
Which of the following schedules BEST addresses these requirements?
An organization is upgrading its network and all of its workstations. The project will occur in phases, with infrastructure upgrades each month and workstation installs every other week. The schedule should accommodate the enterprise-wide changes, while minimizing the impact to the network. Which of the following schedules BEST addresses these...
Which of the following would MOST likely be included in the incident response procedure after a security breach of customer PII?
Which of the following would MOST likely be included in the incident response procedure after a security breach of customer PII?A . Human resourcesB . Public relationsC . MarketingD . Internal network operations centerView AnswerAnswer: B
Which of the following is the BEST solution to improve the equipment's security posture?
Legacy medical equipment, which contains sensitive data, cannot be patched. Which of the following is the BEST solution to improve the equipment's security posture?A . Move the legacy systems behind a WAFB . Implement an air gap for the legacy systems.C . Implement a VPN between the legacy systems and...
Which of the following threat research methodologies would be MOST appropriate for the analyst to use?
A security analyst is researching an incident and uncovers several details that may link to other incidents. The security analyst wants to determine if other incidents are related to the current incident. Which of the following threat research methodologies would be MOST appropriate for the analyst to use?A . Reputation...
Which of the following is the main concern a security analyst should have with this arrangement?
A small electronics company decides to use a contractor to assist with the development of a new FPGA-based device. Several of the development phases will occur off-site at the contractor's labs. Which of the following is the main concern a security analyst should have with this arrangement?A . Making multiple...
CORRECT TEXT
CORRECT TEXT SIMULATION Malware is suspected on a server in the environment. The analyst is provided with the output of commands from servers in the environment and needs to review all output files in order to determine which process running on one of the servers may be malware. INSTRUCTIONS Servers...