Which of the following would BEST satisfy the objectives defined by the compliance officer?

A compliance officer of a large organization has reviewed the firm's vendor management program but has discovered there are no controls defined to evaluate third-party risk or hardware source authenticity. The compliance officer wants to gain some level of assurance on a recurring basis regarding the implementation of controls by...

July 22, 2020 No Comments READ MORE +

Which of the following would explain the difference in results?

A security analyst is trying to determine if a host is active on a network. The analyst first attempts the following: The analyst runs the following command next: Which of the following would explain the difference in results?A . ICMP is being blocked by a firewall.B . The routing tables...

July 22, 2020 No Comments READ MORE +

Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in the future?

During an investigation, a security analyst determines suspicious activity occurred during the night shift over the weekend. Further investigation reveals the activity was initiated from an internal IP going to an external website. Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in...

July 22, 2020 No Comments READ MORE +

Which of the following BEST describes this attack?

A security analyst received a SIEM alert regarding high levels of memory consumption for a critical system. After several attempts to remediate the issue, the system went down. A root cause analysis revealed a bad actor forced the application to not reclaim memory. This caused the system to be depleted...

July 21, 2020 No Comments READ MORE +

Which of the following would BEST identify potential indicators of compromise?

An information security analyst observes anomalous behavior on the SCADA devices in a power plant. This behavior results in the industrial generators overheating and destabilizing the power supply. Which of the following would BEST identify potential indicators of compromise?A . Use Burp Suite to capture packets to the SCADA device's...

July 21, 2020 No Comments READ MORE +

Which of the following is MOST likely an attack vector that is being utilized as part of the testing and assessment?

An analyst is performing penetration testing and vulnerability assessment activities against a new vehicle automation platform. Which of the following is MOST likely an attack vector that is being utilized as part of the testing and assessment?A . FaaSB . RTOSC . SoCD . GPSE . CAN busView AnswerAnswer: B...

July 21, 2020 No Comments READ MORE +

Which of the following software security best practices would prevent an attacker from being able to run arbitrary SQL commands within a web application? (Choose two.)

Which of the following software security best practices would prevent an attacker from being able to run arbitrary SQL commands within a web application? (Choose two.)A . Parameterized queriesB . Session managementC . Input validationD . Output encodingE . Data protectionF . AuthenticationView AnswerAnswer: AC Explanation: Reference: https://www.ptsecurity.com/ww-en/analytics/knowledge-base/how-to-prevent-sql-injection­attacks/

July 20, 2020 No Comments READ MORE +

Which of the following can the analyst conclude?

A security analyst is reviewing packet captures from a system that was compromised. The system was already isolated from the network, but it did have network access for a few hours after being compromised. When viewing the capture in a packet analyzer, the analyst sees the following: Which of the...

July 20, 2020 No Comments READ MORE +

Which of the following would be the MOST appropriate to remediate the controller?

An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer...

July 20, 2020 No Comments READ MORE +

Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?

A security analyst reviews the following aggregated output from an Nmap scan and the border firewall ACL: Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?A . PC1B . PC2C . Server1D . Server2E . FirewallView AnswerAnswer: E

July 16, 2020 No Comments READ MORE +