Which of the following should be notified for lessons learned?
An incident response team detected malicious software that could have gained access to credit card data. The incident response team was able to mitigate significant damage and implement corrective actions. By having incident response mechanisms in place. Which of the following should be notified for lessons learned?A . The human...
Which of the following controls would work BEST to protect the privacy of the data if a device is stolen?
A financial organization has offices located globally. Per the organization’s policies and procedures, all executives who conduct Business overseas must have their mobile devices checked for malicious software or evidence of tempering upon their return. The information security department oversees the process, and no executive has had a device compromised....
Which of the following should be updated NEXT?
A threat hurting team received a new loC from an ISAC that follows a threat actor's profile and activities. Which of the following should be updated NEXT?A . The whitelistB . The DNSC . The blocklistD . The IDS signatureView AnswerAnswer: D Explanation: The IDS signature should be updated next...
Which of the following BEST explains the reason why the company's requirements are not being processed correctly by mailbox providers?
A company's domain has been spooled in numerous phishing campaigns. An analyst needs to determine the company is a victim of domain spoofing, despite having a DMARC record that should tell mailbox providers to ignore any email that fails DMARC upon review of the record, the analyst finds the following:...
Which of the following would be BEST for the analyst to configure to achieve this objective?
A security analyst is researching ways to improve the security of a company's email system to mitigate emails that are impersonating company executives. Which of the following would be BEST for the analyst to configure to achieve this objective?A . A TXT record on the name server for SPFB ....
Which of the following is the BEST way to gather patch information on a specific server?
Which of the following is the BEST way to gather patch information on a specific server?A . Event ViewerB . Custom scriptC . SCAP softwareD . CI/CDView AnswerAnswer: B Explanation: A custom script is a piece of code that can be written to perform a specific task or automate a...
Which of the following is MOST dangerous to the client environment during a vulnerability assessment penetration test?
Which of the following is MOST dangerous to the client environment during a vulnerability assessment penetration test?A . There is a longer period of time to assess the environment.B . The testing is outside the contractual scopeC . There is a shorter period of time to assess the environmentD ....
Which of the following should the analyst report after viewing this Information?
A security analyst is running a tool against an executable of an unknown source. The Input supplied by the tool to the executable program and the output from the executable are shown below: Which of the following should the analyst report after viewing this Information?A . A dynamic library that...
Which of the following would work BEST to prevent this type of Incident in the future?
A security analyst is handling an incident in which ransomware has encrypted the disks of several company workstations. Which of the following would work BEST to prevent this type of Incident in the future?A . Implement a UTM instead of a stateful firewall and enable gateway antivirus.B . Back up...
Which of the following should the analyst do FIRST?
While monitoring the information security notification mailbox, a security analyst notices several emails were repotted as spam. Which of the following should the analyst do FIRST?A . Block the sender In the email gateway.B . Delete the email from the company's email servers.C . Ask the sender to stop sending...