Which of the following should the organization consider investing in FIRST due to the potential impact of availability?
The steering committee for information security management annually reviews the security incident register for the organization to look for trends and systematic issues. The steering committee wants to rank the risks based on past incidents to improve the security program for next year Below is the incident register for the...
Which of the following lines indicates the computer may be compromised?
A user's computer has been running slowly when the user tries to access web pages. A security analyst runs the command netstat -aon from the command line and receives the following output: Which of the following lines indicates the computer may be compromised?A . Line 1B . Line 2C ....
Which of the following controls is the MOST appropriate to mitigate risks?
An information security analyst is working with a data owner to identify the appropriate controls to preserve the confidentiality of data within an enterprise environment One of the primary concerns is exfiltration of data by malicious insiders. Which of the following controls is the MOST appropriate to mitigate risks?A ....
Which of the following MOST likely occurred?
A security analyst was alerted to a tile integrity monitoring event based on a change to the vhost-paymonts .conf file. The output of the diff command against the known-good backup reads as follows: Which of the following MOST likely occurred?A . The file was altered to accept payments without charging...
Which of the following technologies would MOST likely be used to prevent this phishing attempt?
A security analyst is looking at the headers of a few emails that appear to be targeting all users at an organization: Which of the following technologies would MOST likely be used to prevent this phishing attempt?A . DNSSECB . DMARCC . STPD . S/IMAPView AnswerAnswer: B
What is the executable file name or the malware?
What is the executable file name or the malware? View AnswerAnswer: Select the following answer as per diagram below.
Which of the following would BEST prevent this type of theft from occurring in the future?
A company recently experienced a break-in whereby a number of hardware assets were stolen through unauthorized access at the back of the building. Which of the following would BEST prevent this type of theft from occurring in the future?A . Motion detectionB . Perimeter fencingC . Monitored security camerasD ....
Which of the following is the BEST place to acquire evidence to perform data carving?
During an investigation, a security analyst identified machines that are infected with malware the antivirus was unable to detect. Which of the following is the BEST place to acquire evidence to perform data carving?A . The system memoryB . The hard driveC . Network packetsD . The Windows RegistryView AnswerAnswer:...
Which of the following is the BEST technology for the analyst to recommend?
An analyst needs to provide a recommendation that will allow a custom-developed application to have full access to the system's processors and peripherals but still be contained securely from other applications that will be developed. Which of the following is the BEST technology for the analyst to recommend?A . Software-based...
Which of the following is the MOST effective way to prevent any newly infected systems from actually encrypting the data on connected network drives while causing the least disruption to normal Internet traffic?
Ransomware is identified on a company's network that affects both Windows and MAC hosts. The command and control channel for encryption for this variant uses TCP ports from 11000 to 65000. The channel goes to good1. Iholdbadkeys.com, which resolves to IP address 72.172.16.2. Which of the following is the MOST...