Which of the following registry keys would MOST likely have this information?

A security analyst is investigating a malware infection that occurred on a Windows system. The system was not connected to a network and had no wireless capability Company policy prohibits using portable media or mobile storage. The security analyst is trying to determine which user caused the malware to get...

July 6, 2022 No Comments READ MORE +

As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue?

An audit has revealed an organization is utilizing a large number of servers that are running unsupported operating systems. As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue?A . Copies of prior...

July 5, 2022 No Comments READ MORE +

Which of the following controls would have MOST likely prevented this incident?

Data spillage occurred when an employee accidentally emailed a sensitive file to an external recipient. Which of the following controls would have MOST likely prevented this incident?A . SSOB . DLPC . WAFD . VDIView AnswerAnswer: B Explanation: Reference: https://greenlightcorp.com/blog/cyber-security-solutions-data-spillage-and-how-to-create-an-after-incident-to-do-list/

July 5, 2022 No Comments READ MORE +

Based on the scenario and the output from the vulnerability scan, which of the following should the security team do with this finding?

A system’s authority to operate (ATO) is set to expire in four days. Because of other activities and limited staffing, the organization has neglected to start reauthentication activities until now. The cybersecurity group just performed a vulnerability scan with the partial set of results shown below: Based on the scenario...

July 5, 2022 No Comments READ MORE +

Which of the following should the analyst do NEXT?

An incident responder successfully acquired application binaries off a mobile device for later forensic analysis. Which of the following should the analyst do NEXT?A . Decompile each binary to derive the source code.B . Perform a factory reset on the affected mobile device.C . Compute SHA-256 hashes for each binary.D...

July 5, 2022 No Comments READ MORE +

Which of the following solutions would meet this requirement?

A development team signed a contract that requires access to an on-premises physical server. Access must be restricted to authorized users only and cannot be connected to the Internet. Which of the following solutions would meet this requirement?A . Establish a hosted SSC . Implement a CASE . Virtualize the...

July 5, 2022 No Comments READ MORE +

Which of the following should be done to prevent this issue from reoccurring?

A storage area network (SAN) was inadvertently powered off while power maintenance was being performed in a datacenter. None of the systems should have lost all power during the maintenance. Upon review, it is discovered that a SAN administrator moved a power plug when testing the SAN's fault notification features....

July 5, 2022 No Comments READ MORE +

Which of the following should the analyst do FIRST?

A cybersecurity analyst is contributing to a team hunt on an organization's endpoints. Which of the following should the analyst do FIRST?A . Write detection logic.B . Establish a hypothesis.C . Profile the threat actors and activities.D . Perform a process analysis.View AnswerAnswer: C Explanation: Reference: https://www.cybereason.com/blog/blog-the-eight-steps-to-threat-hunting

July 5, 2022 No Comments READ MORE +

Which of the following BEST describes the security analyst's goal?

A security analyst on the threat-hunting team has developed a list of unneeded, benign services that are currently running as part of the standard OS deployment for workstations. The analyst will provide this list to the operations team to create a policy that will automatically disable the services for all...

July 5, 2022 No Comments READ MORE +

Which of the following techniques were used in this scenario?

Joe, a penetration tester, used a professional directory to identify a network administrator and ID administrator for a client’s company. Joe then emailed the network administrator, identifying himself as the ID administrator, and asked for a current password as part of a security exercise. Which of the following techniques were...

July 4, 2022 No Comments READ MORE +