Which of the following would BEST mitigate and improve the security posture of the wireless network for this type of attack?
A security analyst recently discovered two unauthorized hosts on the campus's wireless network segment from a man-m-the-middle attack. The security analyst also verified that privileges were not escalated, and the two devices did not gain access to other network devices. Which of the following would BEST mitigate and improve the...
Which of the following technologies can be used to store digital certificates and is typically used in high-security implementations where integrity is paramount?
Which of the following technologies can be used to store digital certificates and is typically used in high-security implementations where integrity is paramount?A . HSMB . eFuseC . UEFID . Self-encrypting driveView AnswerAnswer: A
Which of the following UEFI settings is the MOST likely cause of the infections?
Bootloader malware was recently discovered on several company workstations. All the workstations run Windows and are current models with UEFI capability. Which of the following UEFI settings is the MOST likely cause of the infections?A . Compatibility modeB . Secure boot modeC . Native modeD . Fast boot modeView AnswerAnswer:...
Which of the following would be the MOST efficient way to increase the security posture of the organization in the shortest amount of time?
A security team is implementing a new vulnerability management program in an environment that has a historically poor security posture. The team is aware of issues patch management in the environment and expects a large number of findings. Which of the following would be the MOST efficient way to increase...
During an investigation, an incident responder intends to recover multiple pieces of digital media.
During an investigation, an incident responder intends to recover multiple pieces of digital media. Before removing the media, the responder should initiate:A . malware scans.B . secure communications.C . chain of custody forms.D . decryption tools.View AnswerAnswer: C
Which of the following commands would MOST likely indicate if the email is malicious?
A user receives a potentially malicious email that contains spelling errors and a PDF document. A security analyst reviews the email and decides to download the attachment to a Linux sandbox for review. Which of the following commands would MOST likely indicate if the email is malicious?A . sha256sum ~/Desktop/file.pdfB...
Which of the following initial actions and tools would provide the BEST approach to determining what is happening?
Ann, a user, reports to the security team that her browser began redirecting her to random sites while using her Windows laptop. Ann further reports that the OS shows the C: drive is out of space despite having plenty of space recently. Ann claims she not downloaded anything. The security...
Which of me following BEST articulates the benefit of leveraging SCAP in an organization's cybersecurity analysis toolset?
Which of me following BEST articulates the benefit of leveraging SCAP in an organization's cybersecurity analysis toolset?A . It automatically performs remedial configuration changes lo enterprise security servicesB . It enables standard checklist and vulnerability analysis expressions for automatonC . It establishes a continuous integration environment for software development operationsD...
Which of the following would be BEST to protect the availability of the APIs?
Clients are unable to access a company’s API to obtain pricing data. An analyst discovers sources other than clients are scraping the API for data, which is causing the servers to exceed available resources. Which of the following would be BEST to protect the availability of the APIs?A . IP...
Which of the following is the BEST example of the level of sophistication this threat actor is using?
A security analyst for a large financial institution is creating a threat model for a specific threat actor that is likely targeting an organization's financial assets. Which of the following is the BEST example of the level of sophistication this threat actor is using?A . Social media accounts attributed to...