Which of the following is the FIRST step the analyst should take to prevent future attacks?
A security analyst is investigating an incident that appears to have started with SOL injection against a publicly available web application. Which of the following is the FIRST step the analyst should take to prevent future attacks?A . Modify the IDS rules to have a signature for SQL injection.B ....
Which of the following is the BEST technique to address the CISO’s concerns?
A company’s Chief Information Security Officer (CISO) is concerned about the integrity of some highly confidential files. Any changes to these files must be tied back to a specific authorized user’s activity session. Which of the following is the BEST technique to address the CISO’s concerns?A . Configure DLP to...
Which of the following BEST describes the method by which the security packages are delivered to the company's customers?
A company creates digitally signed packages for its devices. Which of the following BEST describes the method by which the security packages are delivered to the company's customers?A . Trusted firmware updatesB . SELinuxC . eFuseD . Anti-tamper mechanismView AnswerAnswer: A
For machine learning to be applied effectively toward security analysis automation, it requires.
For machine learning to be applied effectively toward security analysis automation, it requires.A . relevant training data.B . a threat feed APD . a multicore, multiprocessor system.E . anomalous traffic signatures.View AnswerAnswer: A
Which of the following describes the type of threat actors that should concern the security analyst?
A security analyst receives an alert to expect increased and highly advanced cyberattacks originating from a foreign country that recently had sanctions implemented. Which of the following describes the type of threat actors that should concern the security analyst?A . HacktivistB . Organized crimeC . Insider threatD . Nation-stateView AnswerAnswer:...
Which of the following would BEST protect the sensitivity of this data while still allowing the team to perform the testing?
A development team is testing a new application release. The team needs to import existing client PHI data records from the production environment to the test environment to test accuracy and functionality. Which of the following would BEST protect the sensitivity of this data while still allowing the team to...
Which of the following is the BEST solution for the security analyst to implement?
While analyzing network traffic, a security analyst discovers several computers on the network are connecting to a malicious domain that was blocked by a DNS sinkhole. A new private IP range is now visible, but no change requests were made to add it. Which of the following is the BEST...
CORRECT TEXT
CORRECT TEXT You are a cybersecurity analyst tasked with interpreting scan data from Company A's servers. You must verify the requirements are being met for all of the servers and recommend changes if you find they are not. The company's hardening guidelines indicate the following: • TLS 1.2 is the...
Which of the following is the BEST method for accomplishing this task?
A company's security administrator needs to automate several security processes related to testing for the existence of changes within the environment Conditionally other processes will need to be created based on input from prior processes Which of the following is the BEST method for accomplishing this task?A . Machine learning...
Which of the following would work BEST to improve the likelihood of employees quickly recognizing fraudulent emails?
A finance department employee has received a message that appears to have been sent from the Chief Financial Officer (CFO) asking the employee to perform a wife transfer Analysis of the email shows the message came from an external source and is fraudulent. Which of the following would work BEST...