An executive assistant wants to onboard a new cloud based product to help with business analytics and dashboarding. When of the following would be the BEST integration option for the service?
An executive assistant wants to onboard a new cloud based product to help with business analytics and dashboarding. When of the following would be the BEST integration option for the service?A . Manually log in to the service and upload data files on a regular basis.B . Have the internal...
Which of the following remediation actions should the analyst take to implement a vulnerability management process?
A web developer wants to create a new web part within the company website that aggregates sales from individual team sites. A cybersecurity analyst wants to ensure security measurements are implemented during this process. Which of the following remediation actions should the analyst take to implement a vulnerability management process?A...
Which of the following would BEST provide this solution?
Risk management wants IT to implement a solution that will permit an analyst to intercept, execute, and analyze potentially malicious files that are downloaded from the Internet. Which of the following would BEST provide this solution?A . File fingerprintingB . Decomposition of malwareC . Risk evaluationD . SandboxingView AnswerAnswer: D
Which of the following policies would state an employee should not disable security safeguards, such as host firewalls and antivirus on company systems?
Which of the following policies would state an employee should not disable security safeguards, such as host firewalls and antivirus on company systems?A . Code of conduct policyB . Account management policyC . Password policyD . Acceptable use policyView AnswerAnswer: D
Which of the following rules is the BEST solution?
A security administrator needs to create an IDS rule to alert on FTP login attempts by root. Which of the following rules is the BEST solution? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: B
Which of the following BEST describes the security analyst's goal?
A security analyst on the threat-hunting team has developed a list of unneeded, benign services that are currently running as part of the standard OS deployment for workstations. The analyst will provide this list to the operations team to create a policy that will automatically disable the services for all...
Which of the following should the security analyst recommend to identity this behavior without alerting any potential malicious actors?
A threat feed notes malicious actors have been infiltrating companies and exfiltration data to a specific set of domains Management at an organization wants to know if it is a victim. Which of the following should the security analyst recommend to identity this behavior without alerting any potential malicious actors?A...
In which of the following phases is this APT MOST likely to leave discoverable artifacts?
A security analyst is attempting to utilize the blowing threat intelligence for developing detection capabilities: In which of the following phases is this APT MOST likely to leave discoverable artifacts?A . Data collection/exfiltrationB . Defensive evasionC . Lateral movementD . ReconnaissanceView AnswerAnswer: A
Which of the following would be the MOST appropriate to remediate the controller?
An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer...
Which of the following is MOST likely an attack vector that is being utilized as part of the testing and assessment?
An analyst is performing penetration testing and vulnerability assessment activities against a new vehicle automation platform. Which of the following is MOST likely an attack vector that is being utilized as part of the testing and assessment?A . FaaSB . RTOSC . SoCD . GPSE . CAN busView AnswerAnswer: E