Which of the following would be BEST to improve the incident response process?

The SOC is reviewing processes and procedures after a recent incident. The review indicates it took more than 30 minutes to determine that quarantining an infected host was the best course of action. This allowed the malware to spread to additional hosts before it was contained. Which of the following...

March 15, 2021 No Comments READ MORE +

Which of the following types of attack is the analyst seeing?

A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service Unavailable error. The analyst runs a netstat -an command to discover if the web server is up and listening. The analyst receives the following output: TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT TCP 10.1.5.2:80...

March 15, 2021 No Comments READ MORE +

Which of the following should be at the top of the CISO’s list?

A Chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the following should be at the top of the CISO’s list?A . Identify redundant and high-availability systems.B . Identity mission-critical applications and systems.C . Identify the single point of...

March 15, 2021 No Comments READ MORE +

Which of the following configuration should the engineer choose?

A systems engineer is configuring a wireless network. The network must not require installation of third-party software. Mutual authentication of the client and the server must be used. The company has an internal PKI. Which of the following configuration should the engineer choose?A . EAP-TLSB . EAP-TTLSC . EAP-FASTD ....

March 15, 2021 No Comments READ MORE +

Which of the following will the engineer MOST likely use to achieve this objective?

A security engineer needs to build a solution to satisfy regulatory requirements that state certain critical server must be accessed using MFA. However, the critical servers are older and are unable to support the addition of MFA. Which of the following will the engineer MOST likely use to achieve this...

March 15, 2021 No Comments READ MORE +

A public relations team will be taking a group of guests on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboards are cleaned and all desks are cleared. The company is MOST likely trying to protect against.

A public relations team will be taking a group of guests on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboards are cleaned and all desks are cleared. The company is MOST...

March 15, 2021 No Comments READ MORE +

Which of the following adjustments would be the MOST appropriate for the service account?

A security analyst is reviewing the password policy for a service account that is used for a critical network service. The password policy for this account is as follows: Enforce password history: Three passwords remembered Maximum password age: 30 days Minimum password age: Zero days Complexity requirements: At least one...

March 14, 2021 No Comments READ MORE +

Which of the following actions should the employee take?

An organization has created a review process to determine how to best handle data with different sensitivity levels. The process includes the following requirements: - Soft copy Pll must be encrypted. - Hard copy Pll must be placed In a locked container. - Soft copy PHI must be encrypted and...

March 14, 2021 No Comments READ MORE +

Which of the following BEST describes what the technician is trying to correct with the new configuration?

A technician is configuring an intrusion prevention system to improve its ability to find and stop threats In the past, the system did not detect and stop some threats. Which of the following BEST describes what the technician is trying to correct with the new configuration?A . False positivesB ....

March 14, 2021 No Comments READ MORE +

Which of the following BEST describes this type of penetration test?

An authorized user is conducting a penetration scan of a system for an organization. The tester has a set of network diagrams. Source code, version numbers of applications. and other information about the system. Including hostnames and network addresses. Which of the following BEST describes this type of penetration test?A...

March 14, 2021 No Comments READ MORE +