Which of the following security benefits do these actions provide?
A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)A . If a security incident occurs on the device, the correct employee can be notified.B . The security team will be...
Which of the following logs should the analyst use as a data source?
A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst...
Which of the following steps should be taken first?
A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?A . Air gap the system.B . Move the system to a different network segment.C . Create a change control request.D . Apply the patch to the system.View AnswerAnswer: C...
Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?
An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type...
Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation
HOTSPOT Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All...
Which of the following is the most likely to be included as an element of communication in a security awareness program?
Which of the following is the most likely to be included as an element of communication in a security awareness program?A . Reporting phishing attempts or other suspicious activitiesB . Detecting insider threats using anomalous behavior recognitionC . Verifying information when modifying wire transfer dataD . Performing social engineering as...
Which of the following should the organization deploy to best protect against similar attacks in the future?
An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?A . NGFWB . WAFC . TLSD . SD-WANView AnswerAnswer: B Explanation: A buffer overflow is a type of software vulnerability...
Which of the following analysis elements did the company most likely use in making this decision?
A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks. Which of the following analysis elements did the company most likely use in making this decision?A . IMTTRB . RTOC . AROD . MTBFView AnswerAnswer: C Explanation: ARO (Annualized Rate...
Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?
Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?A . FinesB . Audit findingsC . SanctionsD . Reputation damageView AnswerAnswer: A Explanation: PCI DSS is the Payment Card Industry Data Security Standard, which is a set of security requirements...
Which of the following documents should the company provide to the client?
A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?A . MSAB . SLAC . BPAD . SOWView AnswerAnswer: D Explanation: An ISOW is a document that outlines...