Which of the following security benefits do these actions provide?

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)A . If a security incident occurs on the device, the correct employee can be notified.B . The security team will be...

October 11, 2024 No Comments READ MORE +

Which of the following logs should the analyst use as a data source?

A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst...

October 11, 2024 No Comments READ MORE +

Which of the following steps should be taken first?

A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?A . Air gap the system.B . Move the system to a different network segment.C . Create a change control request.D . Apply the patch to the system.View AnswerAnswer: C...

October 11, 2024 No Comments READ MORE +

Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?

An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type...

October 11, 2024 No Comments READ MORE +

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation

HOTSPOT Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All...

October 11, 2024 No Comments READ MORE +

Which of the following is the most likely to be included as an element of communication in a security awareness program?

Which of the following is the most likely to be included as an element of communication in a security awareness program?A . Reporting phishing attempts or other suspicious activitiesB . Detecting insider threats using anomalous behavior recognitionC . Verifying information when modifying wire transfer dataD . Performing social engineering as...

October 11, 2024 No Comments READ MORE +

Which of the following should the organization deploy to best protect against similar attacks in the future?

An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?A . NGFWB . WAFC . TLSD . SD-WANView AnswerAnswer: B Explanation: A buffer overflow is a type of software vulnerability...

October 10, 2024 No Comments READ MORE +

Which of the following analysis elements did the company most likely use in making this decision?

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks. Which of the following analysis elements did the company most likely use in making this decision?A . IMTTRB . RTOC . AROD . MTBFView AnswerAnswer: C Explanation: ARO (Annualized Rate...

October 10, 2024 No Comments READ MORE +

Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?

Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?A . FinesB . Audit findingsC . SanctionsD . Reputation damageView AnswerAnswer: A Explanation: PCI DSS is the Payment Card Industry Data Security Standard, which is a set of security requirements...

October 10, 2024 No Comments READ MORE +

Which of the following documents should the company provide to the client?

A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?A . MSAB . SLAC . BPAD . SOWView AnswerAnswer: D Explanation: An ISOW is a document that outlines...

October 10, 2024 No Comments READ MORE +