Which of the following would BEST protect the sensitivity of this data while still allowing the team to perform the testing?

A development team is testing a new application release. The team needs to import existing client PHI data records from the production environment to the test environment to test accuracy and functionality. Which of the following would BEST protect the sensitivity of this data while still allowing the team to...

January 14, 2022 No Comments READ MORE +

Which of the following would BEST prevent future attacks?

A company recently experienced multiple DNS DDoS attacks, and the information security analyst must provide a DDoS solution to deploy in the company's datacenter. Which of the following would BEST prevent future attacks?A . Configure a sinkhole on the router.B . Buy a UTM to block the number of requests.C...

January 13, 2022 No Comments READ MORE +

Which of the following schedules BEST addresses these requirements?

An organization is upgrading its network and all of its workstations. The project will occur in phases, with infrastructure upgrades each month and workstation installs every other week. The schedule should accommodate the enterprise-wide changes, while minimizing the impact to the network. Which of the following schedules BEST addresses these...

January 13, 2022 No Comments READ MORE +

Which of the following would MOST likely be included in the incident response procedure after a security breach of customer PII?

Which of the following would MOST likely be included in the incident response procedure after a security breach of customer PII?A . Human resourcesB . Public relationsC . MarketingD . Internal network operations centerView AnswerAnswer: B

January 13, 2022 No Comments READ MORE +

Which of the following is the BEST solution to improve the equipment's security posture?

Legacy medical equipment, which contains sensitive data, cannot be patched. Which of the following is the BEST solution to improve the equipment's security posture?A . Move the legacy systems behind a WAFB . Implement an air gap for the legacy systems.C . Implement a VPN between the legacy systems and...

January 13, 2022 No Comments READ MORE +

Which of the following threat research methodologies would be MOST appropriate for the analyst to use?

A security analyst is researching an incident and uncovers several details that may link to other incidents. The security analyst wants to determine if other incidents are related to the current incident. Which of the following threat research methodologies would be MOST appropriate for the analyst to use?A . Reputation...

January 13, 2022 No Comments READ MORE +

Which of the following is the main concern a security analyst should have with this arrangement?

A small electronics company decides to use a contractor to assist with the development of a new FPGA-based device. Several of the development phases will occur off-site at the contractor's labs. Which of the following is the main concern a security analyst should have with this arrangement?A . Making multiple...

January 13, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT SIMULATION Malware is suspected on a server in the environment. The analyst is provided with the output of commands from servers in the environment and needs to review all output files in order to determine which process running on one of the servers may be malware. INSTRUCTIONS Servers...

January 13, 2022 No Comments READ MORE +

Which of the following actions should be taken to BEST mitigate the effects of this type of threat in the future?

A security analyst received a series of antivirus alerts from a workstation segment, and users reported ransomware messages. During lessons-learned activities, the analyst determines the antivirus was able to alert to abnormal behavior but did not stop this newest variant of ransomware. Which of the following actions should be taken...

January 13, 2022 No Comments READ MORE +

Which of the following commands would MOST likely indicate if the email is malicious?

A user receives a potentially malicious email that contains spelling errors and a PDF document. A security analyst reviews the email and decides to download the attachment to a Linux sandbox for review. Which of the following commands would MOST likely indicate if the email is malicious?A . sha256sum ~/Desktop/file.pdfB...

January 13, 2022 No Comments READ MORE +