A security analyst suspects a malware infection was caused by a user who downloaded malware after clicking http://<malwaresource>/A.php in a phishing email.

A security analyst suspects a malware infection was caused by a user who downloaded malware after clicking http://<malwaresource>/A.php in a phishing email. To prevent other computers from being infected by the same malware variation, the analyst should create a rule on the. A. email server that automatically deletes attached executables. B. IDS to match...

Continue reading

Which of the following is the BEST example of the level of sophistication this threat actor is using?

A security analyst for a large financial institution is creating a threat model for a specific threat actor that is likely targeting an organization’s financial assets. Which of the following is the BEST example of the level of sophistication this threat actor is using?A . Social media accounts attributed to the threat actorB ....

Continue reading

Which of the following methods would BEST secure the company’s infrastructure and be the simplest to manage and maintain?

An organization is moving its infrastructure to the cloud in an effort to meet the budget and reduce staffing requirements. The organization has three environments: development, testing, and production. These environments have interdependencies but must remain relatively segmented. Which of the following methods would BEST secure the company’s infrastructure and be the simplest to...

Continue reading

Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?

A security analyst has received reports of very slow, intermittent access to a public-facing corporate server. Suspecting the system may be compromised, the analyst runs the following commands: Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?A . Run crontab -r; rm...

Continue reading