Which of the following would be the MOST appropriate to remediate the controller?

An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer...

July 20, 2020 No Comments READ MORE +

Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?

A security analyst reviews the following aggregated output from an Nmap scan and the border firewall ACL: Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?A . PC1B . PC2C . Server1D . Server2E . FirewallView AnswerAnswer: E

July 16, 2020 No Comments READ MORE +

Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?

A security analyst has received reports of very slow, intermittent access to a public-facing corporate server. Suspecting the system may be compromised, the analyst runs the following commands: Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?A ....

July 15, 2020 No Comments READ MORE +

Which of the following should the analyst do FIRST?

A cybersecurity analyst is contributing to a team hunt on an organization's endpoints. Which of the following should the analyst do FIRST?A . Write detection logic.B . Establish a hypothesis.C . Profile the threat actors and activities.D . Perform a process analysis.View AnswerAnswer: B Explanation: Reference: https://www.cybereason.com/blog/blog-the-eight-steps-to-threat-hunting

July 15, 2020 No Comments READ MORE +

Which of the following is the main concern a security analyst should have with this arrangement?

A small electronics company decides to use a contractor to assist with the development of a new FPGA-based device. Several of the development phases will occur off-site at the contractor's labs. Which of the following is the main concern a security analyst should have with this arrangement?A . Making multiple...

July 14, 2020 No Comments READ MORE +

While planning segmentation for an ICS environment, a security engineer determines IT resources will need access to devices within the ICS environment without compromising security.

While planning segmentation for an ICS environment, a security engineer determines IT resources will need access to devices within the ICS environment without compromising security. To provide the MOST secure access model in this scenario, the jumpbox should be __________.A . placed in an isolated network segment, authenticated on the...

July 14, 2020 No Comments READ MORE +

As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue?

An audit has revealed an organization is utilizing a large number of servers that are running unsupported operating systems. As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue?A . Copies of prior...

July 12, 2020 No Comments READ MORE +

Which of the following commands would MOST likely provide the needed information?

An information security analyst is compiling data from a recent penetration test and reviews the following output: The analyst wants to obtain more information about the web-based services that are running on the target. Which of the following commands would MOST likely provide the needed information?A . ping -t 10.79.95.173.rdns.datacenters.comB...

July 11, 2020 No Comments READ MORE +