Which of the following is the most likely explanation?

A systems administrator is reviewing after-hours traffic flows from data-center servers and sees regular outgoing HTTPS connections from one of the servers to a public IP address. The server should not be making outgoing connections after hours. Looking closer, the administrator sees this traffic pattern around the clock during work...

January 19, 2024 No Comments READ MORE +

Which of the following functions would help the analyst achieve the objective?

A security analyst is writing a shell script to identify IP addresses from the same country. Which of the following functions would help the analyst achieve the objective?A . function w() { info=$(ping -c 1 $1 | awk -F “/” ‘END{print $1}’) && echo “$1 | $info” }B . function...

January 19, 2024 No Comments READ MORE +

Which of the following systems should be prioritized for patching first?

An analyst is reviewing a vulnerability report for a server environment with the following entries: Which of the following systems should be prioritized for patching first?A . 10.101.27.98B . 54.73.225.17C . 54.74.110.26D . 54.74.110.228View AnswerAnswer: D Explanation: The system that should be prioritized for patching first is 54.74.110.228, as it...

January 19, 2024 No Comments READ MORE +

Which of the following security operations tasks are ideal for automation?

Which of the following security operations tasks are ideal for automation?A . Suspicious file analysis: - Look for suspicious-looking graphics in a folder. - Create subfolders in the original folder based on category of graphics found. - Move the suspicious graphics to the appropriate subfolderB . Firewall IoC block actions:...

January 19, 2024 No Comments READ MORE +

Which of the following actions should the technician take to accomplish this task?

A security technician is testing a solution that will prevent outside entities from spoofing the company's email domain, which is compatia.org. The testing is successful, and the security technician is prepared to fully implement the solution. Which of the following actions should the technician take to accomplish this task?A ....

January 18, 2024 No Comments READ MORE +

Which of the following logs should the team review first?

An incident response team receives an alert to start an investigation of an internet outage. The outage is preventing all users in multiple locations from accessing external SaaS resources. The team determines the organization was impacted by a DDoS attack. Which of the following logs should the team review first?A...

January 18, 2024 No Comments READ MORE +

Which of the following implications should be considered on the new hybrid environment?

A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the following implications should be considered on the new hybrid environment?A . The current scanners should be migrated to the cloudB . Cloud-specific misconfigurations may not be detected...

January 18, 2024 No Comments READ MORE +

Which of the following software assessment methods world peak times?

Which of the following software assessment methods world peak times?A . Security regression testingB . Stress testingC . Static analysis testingD . Dynamic analysis testingE . User acceptance testingView AnswerAnswer: B Explanation: Stress testing is a software assessment method that tests how an application performs under peak times or extreme...

January 18, 2024 No Comments READ MORE +

Which of the following should the analyst do first to evaluate the potential impact of this security incident?

During an investigation, an analyst discovers the following rule in an executive's email client: The executive is not aware of this rule. Which of the following should the analyst do first to evaluate the potential impact of this security incident?A . Check the server logs to evaluate which emails were...

January 18, 2024 No Comments READ MORE +

Which of the following solutions will best remedy the vulnerability?

A security analyst discovers the company's website is vulnerable to cross-site scripting. Which of the following solutions will best remedy the vulnerability?A . Prepared statementsB . Server-side input validationC . Client-side input encodingD . Disabled JavaScript filteringView AnswerAnswer: B Explanation: Server-side input validation is a solution that can prevent cross-site...

January 18, 2024 No Comments READ MORE +