According to the security policy, which of the following vulnerabilities should be the highest priority to patch?

The Company shall prioritize patching of publicly available systems and services over patching of internally available system. According to the security policy, which of the following vulnerabilities should be the highest priority to patch? A) B) C) D) A . Option AB . Option BC . Option CD . Option...

March 26, 2024 No Comments READ MORE +

Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?

During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?A . Conduct regular red team exercises over the application in productionB . Ensure that all implemented coding libraries are...

March 26, 2024 No Comments READ MORE +

Which of the following functions would help the analyst achieve the objective?

A security analyst is writing a shell script to identify IP addresses from the same country. Which of the following functions would help the analyst achieve the objective?A . function w() { info=$(ping -c 1 $1 | awk -F “/” ‘END{print $1}’) && echo “$1 | $info” }B . function...

March 26, 2024 No Comments READ MORE +

Which of the following describes how a CSIRT lead determines who should be communicated with and when during a security incident?

Which of the following describes how a CSIRT lead determines who should be communicated with and when during a security incident?A . The lead should review what is documented in the incident response policy or planB . Management level members of the CSIRT should make that decisionC . The lead...

March 26, 2024 No Comments READ MORE +

Which of the following will best achieve the goal and maximize results?

The security operations team is required to consolidate several threat intelligence feeds due to redundant tools and portals. Which of the following will best achieve the goal and maximize results?A . Single pane of glassB . Single sign-onC . Data enrichmentD . DeduplicationView AnswerAnswer: D Explanation: Deduplication is a process...

March 26, 2024 No Comments READ MORE +

Which of the following is the best solution to improve the equipment's security posture?

Legacy medical equipment, which contains sensitive data, cannot be patched. Which of the following is the best solution to improve the equipment's security posture?A . Move the legacy systems behind a WARB . Implement an air gap for the legacy systems.C . Place the legacy systems in the perimeter network.D...

March 26, 2024 No Comments READ MORE +

Which of the following actions would allow the analyst to achieve the objective?

A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers. Which of the following actions would allow the analyst to achieve the objective?A . Upload the binary to an air gapped sandbox for analysisB ....

March 25, 2024 No Comments READ MORE +

Which of the following would be an appropriate course of action?

A Chief Information Security Officer (CISO) is concerned about new privacy regulations that apply to the company. The CISO has tasked a security analyst with finding the proper control functions to verify that a user's data is not altered without the user's consent. Which of the following would be an...

March 25, 2024 No Comments READ MORE +

Which of the following solutions will assist in reducing the risk?

The Chief Information Security Officer wants to eliminate and reduce shadow IT in the enterprise. Several high-risk cloud applications are used that increase the risk to the organization. Which of the following solutions will assist in reducing the risk?A . Deploy a CASB and enable policy enforcementB . Configure MFA...

March 25, 2024 No Comments READ MORE +

Which of the following solutions will best remedy the vulnerability?

A security analyst discovers the company's website is vulnerable to cross-site scripting. Which of the following solutions will best remedy the vulnerability?A . Prepared statementsB . Server-side input validationC . Client-side input encodingD . Disabled JavaScript filteringView AnswerAnswer: B Explanation: Server-side input validation is a solution that can prevent cross-site...

March 25, 2024 No Comments READ MORE +