Which of the following is the BEST method for accomplishing this task?
A company's security administrator needs to automate several security processes related to testing for the existence of changes within the environment Conditionally other processes will need to be created based on input from prior processes Which of the following is the BEST method for accomplishing this task?A . Machine learning...
Which of the following would work BEST to improve the likelihood of employees quickly recognizing fraudulent emails?
A finance department employee has received a message that appears to have been sent from the Chief Financial Officer (CFO) asking the employee to perform a wife transfer Analysis of the email shows the message came from an external source and is fraudulent. Which of the following would work BEST...
In which of the following phases is this APT MOST likely to leave discoverable artifacts?
A security analyst is attempting to utilize the blowing threat intelligence for developing detection capabilities: In which of the following phases is this APT MOST likely to leave discoverable artifacts?A . Data collection/exfiltrationB . Defensive evasionC . Lateral movementD . ReconnaissanceView AnswerAnswer: A
Which of the following should the analyst investigate FIRST?
An analyst performs a routine scan of a host using Nmap and receives the following output: Which of the following should the analyst investigate FIRST?A . Port 21B . Port 22C . Port 23D . Port 80View AnswerAnswer: A
Which of the following is the BEST mitigation to prevent unauthorized access?
A SIEM solution alerts a security analyst of a high number of login attempts against the company's webmail portal. The analyst determines the login attempts used credentials from a past data breach. Which of the following is the BEST mitigation to prevent unauthorized access?A . Single sign-onB . Mandatory access...
Which of the following is the BEST option to protect the data on the remote users1 laptops?
An organization supports a large number of remote users. Which of the following is the BEST option to protect the data on the remote users1 laptops? A. Use whole disk encryption. B. Require the use of VPNs. C. Require employees to sign an NDA. D. implement a DLP solution.View AnswerAnswer:...
Which of the following would be BEST to prevent this type of attack from beinq successful1?
While reviewing log files, a security analyst uncovers a brute-force attack that is being performed against an external webmail portal. Which of the following would be BEST to prevent this type of attack from beinq successful1?A . Implement MFA on the email portal using out-of-band code delivery.B . Create a...
The inability to do remote updates of certificates. keys software and firmware is a security issue commonly associated with:
The inability to do remote updates of certificates. keys software and firmware is a security issue commonly associated with:A . web servers on private networks.B . HVAC control systemsC . smartphonesD . firewalls and UTM devicesView AnswerAnswer: B
Which of the following is a benefit of having these communication plans?
An organization's Chief Information Security Officer (CISO) has asked department leaders to coordinate on communication plans that can be enacted in response to different cybersecurity incident triggers. Which of the following is a benefit of having these communication plans?A . They can help to prevent the inadvertent release of damaging...
Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?
A security analyst reviews the following aggregated output from an Nmap scan and the border firewall ACL: Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?A . PC1B . PC2C . Server1D . Server2E . FirewallView AnswerAnswer: B