Which of the following would BEST identify potential indicators of compromise?

An information security analyst observes anomalous behavior on the SCADA devices in a power plant. This behavior results in the industrial generators overheating and destabilizing the power supply. Which of the following would BEST identify potential indicators of compromise?A . Use Burp Suite to capture packets to the SCADA device's...

December 2, 2020 No Comments READ MORE +

Which of the following is the MOST likely cause of this issue?

A security analyst received an alert from the SIEM indicating numerous login attempts from users outside their usual geographic zones, all of which were initiated through the web-based mail server. The logs indicate all domain accounts experienced two login attempts during the same time frame. Which of the following is...

December 2, 2020 No Comments READ MORE +

Which of the following commands would work BEST to achieve the desired result?

A security analyst is reviewing the logs from an internal chat server. The chat.log file is too large to review manually, so the analyst wants to create a shorter log file that only includes lines associated with a user demonstrating anomalous activity. Below is a snippet of the log: Which...

December 1, 2020 No Comments READ MORE +

Which of the following would MOST likely be included in the incident response procedure after a security breach of customer PII?

Which of the following would MOST likely be included in the incident response procedure after a security breach of customer PII?A . Human resourcesB . Public relationsC . MarketingD . Internal network operations centerView AnswerAnswer: B

December 1, 2020 No Comments READ MORE +

Which of the following roles is ultimately responsible for determining the classification levels assigned to specific data sets?

Which of the following roles is ultimately responsible for determining the classification levels assigned to specific data sets?A . Data custodianB . Data ownerC . Data processorD . Senior managementView AnswerAnswer: B Explanation: Reference: https://www.pearsonitcertification.com/articles/article.aspx?p=2731933&seqNum=3

December 1, 2020 No Comments READ MORE +

Which of the following is the BEST approach for supply chain assessment when selecting a vendor?

An analyst is participating in the solution analysis process for a cloud-hosted SIEM platform to centralize log monitoring and alerting capabilities in the SOC. Which of the following is the BEST approach for supply chain assessment when selecting a vendor?A . Gather information from providers, including datacenter specifications and copies...

November 30, 2020 No Comments READ MORE +

Which of the following BEST describes the security analyst's goal?

A security analyst on the threat-hunting team has developed a list of unneeded, benign services that are currently running as part of the standard OS deployment for workstations. The analyst will provide this list to the operations team to create a policy that will automatically disable the services for all...

November 29, 2020 No Comments READ MORE +

Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in the future?

During an investigation, a security analyst determines suspicious activity occurred during the night shift over the weekend. Further investigation reveals the activity was initiated from an internal IP going to an external website. Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in...

November 29, 2020 No Comments READ MORE +

As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue?

An audit has revealed an organization is utilizing a large number of servers that are running unsupported operating systems. As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue?A . Copies of prior...

November 29, 2020 No Comments READ MORE +

Which of the following is the FIRST step the analyst should take?

A cyber-incident response analyst is investigating a suspected cryptocurrency miner on a company's server. Which of the following is the FIRST step the analyst should take?A . Create a full disk image of the server's hard drive to look for the file containing the malware.B . Run a manual antivirus...

November 28, 2020 No Comments READ MORE +