Which of the following incident response activities describes this process?

During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?A . AnalysisB . Lessons learnedC . DetectionD . ContainmentView AnswerAnswer: A Explanation: Analysis is the incident response activity that describes the process of understanding the...

April 7, 2025 No Comments READ MORE +

Which of the following describes the action the security team will most likely be required to take?

After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?A . Retain the emails between the...

April 6, 2025 No Comments READ MORE +

You are security administrator investigating a potential infection on a network

HOTSPOT HOTSPOT You are security administrator investigating a potential infection on a network. Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected. View AnswerAnswer: Explanation: Based on the logs, it seems that the host...

April 5, 2025 No Comments READ MORE +

Which of the following options is the most appropriate?

A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?A . Testing input validation on the user input fieldsB . Performing code signing on company-developed softwareC . Performing static code analysis on the softwareD ....

April 5, 2025 No Comments READ MORE +

Which of the following automation techniques should a systems administrator use to streamline account creation?

The management team notices that new accounts that are set up manually do not always have correct access or permissions. Which of the following automation techniques should a systems administrator use to streamline account creation?A . Guard rail scriptB . Ticketing workflowC . Escalation scriptD . User provisioning scriptView AnswerAnswer:...

April 5, 2025 No Comments READ MORE +

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?A . VM escapeB . SQL injectionC . Buffer overflowD . Race conditionView AnswerAnswer: C Explanation: A buffer overflow is a vulnerability that occurs when an application writes more data to a memory buffer...

April 5, 2025 No Comments READ MORE +

Which of the following must be considered when designing a high-availability network? (Select two).

Which of the following must be considered when designing a high-availability network? (Select two).A . Ease of recoveryB . Ability to patchC . Physical isolationD . ResponsivenessE . Attack surfaceF . Extensible authenticationView AnswerAnswer: AE Explanation: A high-availability network is a network that is designed to minimize downtime and ensure...

April 3, 2025 No Comments READ MORE +

Which of the following must be considered when designing a high-availability network? (Choose two).

Which of the following must be considered when designing a high-availability network? (Choose two).A . Ease of recoveryB . Ability to patchC . Physical isolationD . ResponsivenessE . Attack surfaceF . Extensible authenticationView AnswerAnswer: A, E Explanation: A high-availability network is a network that is designed to minimize downtime and...

March 31, 2025 No Comments READ MORE +

Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?

An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type...

March 30, 2025 No Comments READ MORE +

Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?A . EncryptedB . Intellectual propertyC . CriticalD . Data...

March 30, 2025 No Comments READ MORE +