Which of the following actions should be taken to BEST mitigate the effects of this type of threat in the future?
A security analyst received a series of antivirus alerts from a workstation segment, and users reported ransomware messages. During lessons-learned activities, the analyst determines the antivirus was able to alert to abnormal behavior but did not stop this newest variant of ransomware. Which of the following actions should be taken...
Which of the following commands would MOST likely indicate if the email is malicious?
A user receives a potentially malicious email that contains spelling errors and a PDF document. A security analyst reviews the email and decides to download the attachment to a Linux sandbox for review. Which of the following commands would MOST likely indicate if the email is malicious?A . sha256sum ~/Desktop/file.pdfB...
Which of the following should the organization consider investing in FIRST due to the potential impact of availability?
The steering committee for information security management annually reviews the security incident register for the organization to look for trends and systematic issues. The steering committee wants to rank the risks based on past incidents to improve the security program for next year Below is the incident register for the...
Which of the following lines indicates the computer may be compromised?
A user's computer has been running slowly when the user tries to access web pages. A security analyst runs the command netstat -aon from the command line and receives the following output: Which of the following lines indicates the computer may be compromised?A . Line 1B . Line 2C ....
Which of the following controls is the MOST appropriate to mitigate risks?
An information security analyst is working with a data owner to identify the appropriate controls to preserve the confidentiality of data within an enterprise environment One of the primary concerns is exfiltration of data by malicious insiders. Which of the following controls is the MOST appropriate to mitigate risks?A ....
Which of the following MOST likely occurred?
A security analyst was alerted to a tile integrity monitoring event based on a change to the vhost-paymonts .conf file. The output of the diff command against the known-good backup reads as follows: Which of the following MOST likely occurred?A . The file was altered to accept payments without charging...
Which of the following technologies would MOST likely be used to prevent this phishing attempt?
A security analyst is looking at the headers of a few emails that appear to be targeting all users at an organization: Which of the following technologies would MOST likely be used to prevent this phishing attempt?A . DNSSECB . DMARCC . STPD . S/IMAPView AnswerAnswer: B
What is the executable file name or the malware?
What is the executable file name or the malware? View AnswerAnswer: Select the following answer as per diagram below.
Which of the following would BEST prevent this type of theft from occurring in the future?
A company recently experienced a break-in whereby a number of hardware assets were stolen through unauthorized access at the back of the building. Which of the following would BEST prevent this type of theft from occurring in the future?A . Motion detectionB . Perimeter fencingC . Monitored security camerasD ....
Which of the following is the BEST place to acquire evidence to perform data carving?
During an investigation, a security analyst identified machines that are infected with malware the antivirus was unable to detect. Which of the following is the BEST place to acquire evidence to perform data carving?A . The system memoryB . The hard driveC . Network packetsD . The Windows RegistryView AnswerAnswer:...