Which of the following lines of PowerShell script will allow a user to extract the last 10.000 lines of the loq for review?

Massivelog log has grown to 40GB on a Windows server At this size, local tools are unable to read the file, and it cannot be moved off the virtual server where it is located. Which of the following lines of PowerShell script will allow a user to extract the last...

January 20, 2022 No Comments READ MORE +

In addition to retraining the employee, which of the following would prevent this from happening in the future?

An employee in the billing department accidentally sent a spreadsheet containing payment card data to a recipient outside the organization. The employee intended to send the spreadsheet to an internal staff member with a similar name and was unaware of the mistake until the recipient replied to the message. In...

January 20, 2022 No Comments READ MORE +

Which of the following are components of the intelligence cycle? (Select TWO.)

Which of the following are components of the intelligence cycle? (Select TWO.)A . CollectionB . NormalizationC . ResponseD . AnalysisE . CorrectionF . DissensionView AnswerAnswer: B,E

January 20, 2022 No Comments READ MORE +

Which of the following describes the access management policy in place at the company?

A company’s senior human resources administrator left for another position, and the assistant administrator was promoted into the senior position. On the official start day, the new senior administrator planned to ask for extended access permissions but noticed the permissions were automatically granted on that day. Which of the following...

January 20, 2022 No Comments READ MORE +

Which of the following BEST describes the reason why the email was blocked?

A security analyst is reviewing the following log from an email security service. Which of the following BEST describes the reason why the email was blocked? A. The To address is invalid. B. The email originated from the www.spamfilter.org URL. C. The IP address and the remote server name are...

January 20, 2022 No Comments READ MORE +

Which of the following describes the type of threat actors that should concern the security analyst?

A security analyst receives an alert to expect increased and highly advanced cyberattacks originating from a foreign country that recently had sanctions implemented. Which of the following describes the type of threat actors that should concern the security analyst?A . HacktivistB . Organized crimeC . Insider threatD . Nation-stateView AnswerAnswer:...

January 20, 2022 No Comments READ MORE +

Which of the following should the security analyst recommend to identity this behavior without alerting any potential malicious actors?

A threat feed notes malicious actors have been infiltrating companies and exfiltration data to a specific set of domains Management at an organization wants to know if it is a victim. Which of the following should the security analyst recommend to identity this behavior without alerting any potential malicious actors?A...

January 20, 2022 No Comments READ MORE +

Which of the following should be considered FIRST prior to disposing of the electronic data?

An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets. Which of the following should be considered FIRST prior to disposing of the electronic data?A . Sanitization policyB . Data sovereigntyC . Encryption policyD . Retention standardsView AnswerAnswer: D

January 19, 2022 No Comments READ MORE +

Which of the following explains the reason why an architect would set up the network this way?

A proposed network architecture requires systems to be separated from each other logically based on defined risk levels. Which of the following explains the reason why an architect would set up the network this way?A . To complicate the network and frustrate a potential malicious attackerB . To reduce the...

January 19, 2022 No Comments READ MORE +

A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks in

A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks inA . Strict input validationB . BlacklistingC . SQL patchingD . Content filteringE . Output encodingView AnswerAnswer: A

January 19, 2022 No Comments READ MORE +