Which of the following is the BEST technology for the analyst to recommend?

An analyst needs to provide a recommendation that will allow a custom-developed application to have full access to the system's processors and peripherals but still be contained securely from other applications that will be developed. Which of the following is the BEST technology for the analyst to recommend?A . Software-based...

January 12, 2022 No Comments READ MORE +

Which of the following is the MOST effective way to prevent any newly infected systems from actually encrypting the data on connected network drives while causing the least disruption to normal Internet traffic?

Ransomware is identified on a company's network that affects both Windows and MAC hosts. The command and control channel for encryption for this variant uses TCP ports from 11000 to 65000. The channel goes to good1. Iholdbadkeys.com, which resolves to IP address 72.172.16.2. Which of the following is the MOST...

January 12, 2022 No Comments READ MORE +

Which of the following are the BEST actions the analyst can take to stop any further compromise?

CORRECT TEXT While investigating an incident in a company's SIEM console, a security analyst found hundreds of failed SSH login attempts, which all occurred in rapid succession. The failed attempts were followed by a successful login on the root user Company policy allows systems administrators to manage their systems only...

January 11, 2022 No Comments READ MORE +

Which of the following would be the MOST appropriate to remediate the controller?

An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer...

January 11, 2022 No Comments READ MORE +

Which of the following should be the team’s NEXT step during the detection phase of this response process?

A team of security analysts has been alerted to potential malware activity. The initial examination indicates one of the affected workstations is beaconing on TCP port 80 to five IP addresses and attempting to spread across the network over port 445. Which of the following should be the team’s NEXT...

January 11, 2022 No Comments READ MORE +

Which of the following data privacy standards does this violate?

A pharmaceutical company's marketing team wants to send out notifications about new products to alert users of recalls and newly discovered adverse drug reactions. The team plans to use the names and mailing addresses that users have provided. Which of the following data privacy standards does this violate?A . Purpose...

November 3, 2021 No Comments READ MORE +

The inability to do remote updates of certificates, keys, software, and firmware is a security issue commonly associated with:

The inability to do remote updates of certificates, keys, software, and firmware is a security issue commonly associated with:A . web servers on private networksB . HVAC control systemsC . smartphonesD . firewalls and UTM devicesView AnswerAnswer: B

November 3, 2021 No Comments READ MORE +

Which of the following methods would BEST secure the company's infrastructure and be the simplest to manage and maintain?

An organization is moving its infrastructure to the cloud in an effort to meet the budget and reduce staffing requirements. The organization has three environments: development, testing, and production. These environments have interdependencies but must remain relatively segmented. Which of the following methods would BEST secure the company's infrastructure and...

November 3, 2021 No Comments READ MORE +

Which of the following commands should the analyst use?

An analyst wants to identify hosts that are connecting to the external FTP servers and what, if any, passwords are being used. Which of the following commands should the analyst use?A . tcpdump CX dst port 21B . ftp ftp.server Cp 21C . nmap Co ftp.server Cp 21D . telnet...

November 3, 2021 No Comments READ MORE +

Which of the following suggests the system that produced output was compromised?

After receiving reports latency, a security analyst performs an Nmap scan and observes the following output: Which of the following suggests the system that produced output was compromised?A . Secure shell is operating of compromise on this system.B . There are no indicators of compromise on this system.C . MySQL...

November 2, 2021 No Comments READ MORE +