Which of the following best describes what the security analyst should do to identify this behavior?

A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks. SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?A . [Digital forensicsB . E-discoveryC . Incident responseD...

December 17, 2023 No Comments READ MORE +

Which of the following should the systems administrator use?

A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems...

December 17, 2023 No Comments READ MORE +

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?A . AutomationB . Compliance checklistC . AttestationD . Manual auditView AnswerAnswer: A Explanation: Automation is the best way to consistently determine on a daily basis whether security...

December 15, 2023 No Comments READ MORE +

Which of the following would be the best way to block unknown programs from executing?

Which of the following would be the best way to block unknown programs from executing?A . Access control listB . Application allow list.C . Host-based firewallD . DLP solutionView AnswerAnswer: B Explanation: An application allow list is a security technique that specifies which applications are permitted to run on a...

December 15, 2023 No Comments READ MORE +

Which of the following analysis elements did the company most likely use in making this decision?

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks. Which of the following analysis elements did the company most likely use in making this decision?A . IMTTRB . RTOC . AROD . MTBFView AnswerAnswer: C Explanation: ARO (Annualized Rate...

December 14, 2023 No Comments READ MORE +

Which of the following should be done next?

A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?A . Conduct an audit.B . Initiate a penetration test.C . Rescan the network.D . Submit a report.View AnswerAnswer: C Explanation: After completing...

December 14, 2023 No Comments READ MORE +

Which of the following is a hardware-specific vulnerability?

Which of the following is a hardware-specific vulnerability?A . Firmware versionB . Buffer overflowC . SQL injectionD .   Cross-site scriptingView AnswerAnswer: A Explanation: Firmware is a type of software that is embedded in a hardware device, such as a router, a printer, or a BIOS chip. Firmware controls the...

December 14, 2023 No Comments READ MORE +

You are security administrator investigating a potential infection on a network.

You are security administrator investigating a potential infection on a network. Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected. View AnswerAnswer: Explanation: Based on the logs, it seems that the host that originated...

December 14, 2023 No Comments READ MORE +

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button....

December 13, 2023 No Comments READ MORE +

Which of the following meets these requirements?

A systems administrator is looking for a low-cost application-hosting solution that is cloud-based. Which of the following meets these requirements?A . Serverless frameworkB . Type 1 hvpervisorC . SD-WAND . SDNView AnswerAnswer: A Explanation: A serverless framework is a cloud-based application-hosting solution that meets the requirements of low-cost and cloud-based....

December 12, 2023 No Comments READ MORE +