When of the following points of the Diamond Model of Intrusion Analysis does this intelligence represent?
An analyst receives artifacts from a recent Intrusion and is able to pull a domain, IP address, email address, and software version. When of the following points of the Diamond Model of Intrusion Analysis does this intelligence represent?A . InfrastructureB . CapabilitiesC . AdversaryD . VictimsView AnswerAnswer: A Explanation: The...
Which of the following can the hardware manufacturer implement to prevent firmware downgrades?
A computer hardware manufacturer developing a new SoC that will be used by mobile devices. The SoC should not allow users or the process to downgrade from a newer firmware to an older one. Which of the following can the hardware manufacturer implement to prevent firmware downgrades?A . EncryptionB ....
Which of the Wowing is MOST likely happening?
An analyst is reviewing the following output as part of an incident: Which of the Wowing is MOST likely happening?A . The hosts are part of a reflective denial -of -service attack.B . Information is leaking from the memory of host 10.20 30.40C . Sensitive data is being exfilltrated by...
Which of the following will establish a more automated approach to secure data transfers between the two entities?
Company A is m the process of merging with Company B As part of the merger, connectivity between the ERP systems must be established so portent financial information can be shared between the two entitles. Which of the following will establish a more automated approach to secure data transfers between...
Which of following allows Secure Boot to be enabled?
Which of following allows Secure Boot to be enabled?A . eFuseB . UEFIC . MSMD . PAMView AnswerAnswer: B Explanation: UEFI, or Unified Extensible Firmware Interface, is a specification that defines the software interface between an operating system and platform firmware. UEFI replaces the legacy BIOS (Basic Input/Output System) interface...
Which of the following Is MOST likely occurring?
A security analyst is reviewing the following server statistics: Which of the following Is MOST likely occurring?A . Race conditionB . Privilege escalationC . Resource exhaustionD . VM escapeView AnswerAnswer: C Explanation: Resource exhaustion occurs when a system runs out of resources such as memory, CPU, disk space, or network...
Which of the following security recommendations would allow employees to browse non-business-related websites?
A company’s Chief Information Security Officer (CISO) published an Internet usage policy that prohibits employees from accessing unauthorized websites. The IT department whitelisted websites used for business needs. The CISO wants the security analyst to recommend a solution that would improve security and support employee morale. Which of the following...
Which of the following techniques is the analyst using?
After examine a header and footer file, a security analyst begins reconstructing files by scanning the raw data bytes of a hard disk and rebuilding them. Which of the following techniques is the analyst using?A . Header analysisB . File carvingC . Metadata analysisD . Data recoveryView AnswerAnswer: B Explanation:...
The Chief information Officer of a large cloud software vendor reports that many employees are falling victim to phishing emails because they appear to come from other employees.
The Chief information Officer of a large cloud software vendor reports that many employees are falling victim to phishing emails because they appear to come from other employees. Which of the following would BEST prevent this issueA . Induce digital signatures on messages originating within the company.B . Require users...
Which of the following roles would be BEST suited to determine the breach notification requirements?
A company recently experienced a breach of sensitive information that affects customers across multiple geographical regions. Which of the following roles would be BEST suited to determine the breach notification requirements?A . Legal counselB . Chief Security OfficerC . Human resourcesD . Law enforcementView AnswerAnswer: A Explanation: A breach notification...