A cybersecurity analyst is reading a daily intelligence digest of new vulnerabilities.
A cybersecurity analyst is reading a daily intelligence digest of new vulnerabilities. The type of vulnerability that should be disseminated FIRST is one that:A . enables remote code execution that is being exploited in the wild.B . enables data leakage but is not known to be in the environmentC ....
Which of the following should be done to prevent this issue from reoccurring?
A storage area network (SAN) was inadvertently powered off while power maintenance was being performed in a datacenter. None of the systems should have lost all power during the maintenance. Upon review, it is discovered that a SAN administrator moved a power plug when testing the SAN's fault notification features....
Which of the following is the FIRST step the analyst should take to prevent future attacks?
A security analyst is investigating an incident that appears to have started with SOL injection against a publicly available web application. Which of the following is the FIRST step the analyst should take to prevent future attacks?A . Modify the IDS rules to have a signature for SQL injection.B ....
Which of the following is the BEST technique to address the CISO’s concerns?
A company’s Chief Information Security Officer (CISO) is concerned about the integrity of some highly confidential files. Any changes to these files must be tied back to a specific authorized user’s activity session. Which of the following is the BEST technique to address the CISO’s concerns?A . Configure DLP to...
Which of the following BEST describes the method by which the security packages are delivered to the company's customers?
A company creates digitally signed packages for its devices. Which of the following BEST describes the method by which the security packages are delivered to the company's customers?A . Trusted firmware updatesB . SELinuxC . eFuseD . Anti-tamper mechanismView AnswerAnswer: A
For machine learning to be applied effectively toward security analysis automation, it requires.
For machine learning to be applied effectively toward security analysis automation, it requires.A . relevant training data.B . a threat feed APD . a multicore, multiprocessor system.E . anomalous traffic signatures.View AnswerAnswer: A
Which of the following describes the type of threat actors that should concern the security analyst?
A security analyst receives an alert to expect increased and highly advanced cyberattacks originating from a foreign country that recently had sanctions implemented. Which of the following describes the type of threat actors that should concern the security analyst?A . HacktivistB . Organized crimeC . Insider threatD . Nation-stateView AnswerAnswer:...
Which of the following would BEST protect the sensitivity of this data while still allowing the team to perform the testing?
A development team is testing a new application release. The team needs to import existing client PHI data records from the production environment to the test environment to test accuracy and functionality. Which of the following would BEST protect the sensitivity of this data while still allowing the team to...
Which of the following is the BEST solution for the security analyst to implement?
While analyzing network traffic, a security analyst discovers several computers on the network are connecting to a malicious domain that was blocked by a DNS sinkhole. A new private IP range is now visible, but no change requests were made to add it. Which of the following is the BEST...
CORRECT TEXT
CORRECT TEXT You are a cybersecurity analyst tasked with interpreting scan data from Company A's servers. You must verify the requirements are being met for all of the servers and recommend changes if you find they are not. The company's hardening guidelines indicate the following: • TLS 1.2 is the...