Which of the following is the BEST remediation for this vulnerability?
A remote code execution vulnerability was discovered in the RDP. An organization currently uses RDP for remote access to a portion of its VDI environment. The analyst verified network-level authentication is enabled. Which of the following is the BEST remediation for this vulnerability?A . Verify the latest endpoint-protection signature is...
In addition to technical response activities, which of the following is the main reason why communication must be addressed in an effective incident response program?
A Chief Security Officer (CSO) is working on the communication requirements (or an organization's incident response plan. In addition to technical response activities, which of the following is the main reason why communication must be addressed in an effective incident response program?A . Public relations must receive information promptly in...
In web application scanning, static analysis refers to scanning:
In web application scanning, static analysis refers to scanning:A . the system for vulnerabilities before installing the application.B . the compiled code of the application to detect possible issues.C . an application that is installed and active on a system.D . an application that is installed on a system that...
A security analyst discovers accounts in sensitive SaaS-based systems are not being removed in a timely manner when an employee leaves the organization.
A security analyst discovers accounts in sensitive SaaS-based systems are not being removed in a timely manner when an employee leaves the organization. To BEST resolve the issue, the organization should implementA . federated authenticationB . role-based access control.C . manual account reviewsD . multifactor authentication.View AnswerAnswer: A
Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in the future?
During an investigation, a security analyst determines suspicious activity occurred during the night shift over the weekend. Further investigation reveals the activity was initiated from an internal IP going to an external website. Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in...
Which of the following should the security analyst implement to BEST mitigate the risk of sensitive data exposure?
The Chief Information Officer (CIO) of a large healthcare institution is concerned about all machines having direct access to sensitive patient information. Which of the following should the security analyst implement to BEST mitigate the risk of sensitive data exposure?A . A cloud access service broker systemB . NAC to...
Which of the following will fix the cause of the issue?
A web-based front end for a business intelligence application uses pass-through authentication to authenticate users. The application then uses a service account, to perform queries and look up data m a database A security analyst discovers employees are accessing data sets they have not been authorized to use. Which of...
Which of the following is the BEST solution for the security analyst to implement?
While analyzing network traffic, a security analyst discovers several computers on the network are connecting to a malicious domain that was blocked by a DNS sinkhole. A new private IP range is now visible, but no change requests were made to add it. Which of the following is the BEST...
Which of the following would be BEST to implement in the legacy application?
Portions of a legacy application are being refactored to discontinue the use of dynamic SQL. Which of the following would be BEST to implement in the legacy application?A . Multifactor authenticationB . Web-application firewallC . SQL injectionD . Parameterized queriesE . Input validationView AnswerAnswer: C
A cybersecurity analyst is reading a daily intelligence digest of new vulnerabilities. The type of vulnerability that should be disseminated FIRST is one that:
A cybersecurity analyst is reading a daily intelligence digest of new vulnerabilities. The type of vulnerability that should be disseminated FIRST is one that:A . enables remote code execution that is being exploited in the wild.B . enables data leakage but is not known to be in the environmentC ....