Which of the following incident response activities describes this process?
During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?A . AnalysisB . Lessons learnedC . DetectionD . ContainmentView AnswerAnswer: A Explanation: Analysis is the incident response activity that describes the process of understanding the...
Which of the following describes the action the security team will most likely be required to take?
After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?A . Retain the emails between the...
You are security administrator investigating a potential infection on a network
HOTSPOT HOTSPOT You are security administrator investigating a potential infection on a network. Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected. View AnswerAnswer: Explanation: Based on the logs, it seems that the host...
Which of the following options is the most appropriate?
A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?A . Testing input validation on the user input fieldsB . Performing code signing on company-developed softwareC . Performing static code analysis on the softwareD ....
Which of the following automation techniques should a systems administrator use to streamline account creation?
The management team notices that new accounts that are set up manually do not always have correct access or permissions. Which of the following automation techniques should a systems administrator use to streamline account creation?A . Guard rail scriptB . Ticketing workflowC . Escalation scriptD . User provisioning scriptView AnswerAnswer:...
Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?
Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?A . VM escapeB . SQL injectionC . Buffer overflowD . Race conditionView AnswerAnswer: C Explanation: A buffer overflow is a vulnerability that occurs when an application writes more data to a memory buffer...
Which of the following must be considered when designing a high-availability network? (Select two).
Which of the following must be considered when designing a high-availability network? (Select two).A . Ease of recoveryB . Ability to patchC . Physical isolationD . ResponsivenessE . Attack surfaceF . Extensible authenticationView AnswerAnswer: AE Explanation: A high-availability network is a network that is designed to minimize downtime and ensure...
Which of the following must be considered when designing a high-availability network? (Choose two).
Which of the following must be considered when designing a high-availability network? (Choose two).A . Ease of recoveryB . Ability to patchC . Physical isolationD . ResponsivenessE . Attack surfaceF . Extensible authenticationView AnswerAnswer: A, E Explanation: A high-availability network is a network that is designed to minimize downtime and...
Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?
An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type...
Which of the following is the type of data these employees are most likely to use in day-to-day work activities?
Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?A . EncryptedB . Intellectual propertyC . CriticalD . Data...