Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?

Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?A . Develop a call tree to inform impacted usersB . Schedule a review with all teams to discuss what occurredC . Create an executive summary to...

April 3, 2024 No Comments READ MORE +

Which of the following is the best technique to perform the analysis?

A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?A . Code analysisB . Static analysisC . Reverse engineeringD . FuzzingView AnswerAnswer: C Explanation: Reverse engineering is a technique that involves analyzing a binary file to understand its...

April 3, 2024 No Comments READ MORE +

Which of the following items should be included in a vulnerability scan report? (Choose two.)

Which of the following items should be included in a vulnerability scan report? (Choose two.)A . Lessons learnedB . Service-level agreementC . PlaybookD . Affected hostsE . Risk scoreF . Education planView AnswerAnswer: D, E Explanation: A vulnerability scan report should include information about the affected hosts, such as their...

April 2, 2024 No Comments READ MORE +

Which of the following will most likely ensure that mission-critical services are available in the event of an incident?

Which of the following will most likely ensure that mission-critical services are available in the event of an incident?A . Business continuity planB . Vulnerability management planC . Disaster recovery planD . Asset management planView AnswerAnswer: C Explanation:

April 2, 2024 No Comments READ MORE +

Which of the following must be collected first in a computer system, related to its volatility level?

During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related to its volatility level?A . Disk contentsB . Backup dataC . Temporary filesD . Running processesView AnswerAnswer: D Explanation: The most volatile type of evidence...

April 2, 2024 No Comments READ MORE +

Which of the following cloud recovery strategies would work best to attain the desired outcome?

An organization wants to move non-essential services into a cloud computing environment. The management team has a cost focus and would like to achieve a recovery time objective of 12 hours. Which of the following cloud recovery strategies would work best to attain the desired outcome?A . Duplicate all services...

April 2, 2024 No Comments READ MORE +

To allow this new technology to be deployed securely going forward, which of the following will BEST address these findings?

During a company’s most recent incident, a vulnerability in custom software was exploited on an externally facing server by an APT. The lessons-learned report noted the following: • The development team used a new software language that was not supported by the security team's automated assessment tools. • During the...

April 2, 2024 No Comments READ MORE +

Which of the following best describes the potential security concern?

The following output is from a tcpdump al the edge of the corporate network: Which of the following best describes the potential security concern?A . Payload lengths may be used to overflow buffers enabling code execution.B . Encapsulated traffic may evade security monitoring and defensesC . This traffic exhibits a...

April 2, 2024 No Comments READ MORE +

Which of the following best describes the current stage of the Cyber Kill Chain that the threat actor is currently operating in?

A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attack. Which of the following best describes the current stage of the Cyber Kill Chain that the threat actor is currently operating...

April 2, 2024 No Comments READ MORE +

Which of the following would be the best threat intelligence source to learn about this new campaign?

An analyst has been asked to validate the potential risk of a new ransomware campaign that the Chief Financial Officer read about in the newspaper. The company is a manufacturer of a very small spring used in the newest fighter jet and is a critical piece of the supply chain...

April 1, 2024 No Comments READ MORE +