Which of the following would be the MOST efficient way to increase the security posture of the organization in the shortest amount of time?

A security team is implementing a new vulnerability management program in an environment that has a historically poor security posture. The team is aware of issues patch management in the environment and expects a large number of findings . Which of the following would be the MOST efficient way to...

September 19, 2022 No Comments READ MORE +

Which of the following is the BEST approach for supply chain assessment when selecting a vendor?

An analyst is participating in the solution analysis process for a cloud-hosted SIEM platform to centralize log monitoring and alerting capabilities in the SOC. Which of the following is the BEST approach for supply chain assessment when selecting a vendor?A . Gather information from providers, including datacenter specifications and copies...

September 19, 2022 No Comments READ MORE +

Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?

Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?A . Reverse engineering B. Fuzzing C. Penetration testing D. Network mappingView AnswerAnswer: C

September 18, 2022 No Comments READ MORE +

Which of the following changes should the security analyst make to BEST protect the environment?

A security analyst has discovered trial developers have installed browsers on all development servers in the company's cloud infrastructure and are using them to browse the Internet . Which of the following changes should the security analyst make to BEST protect the environment?A . Create a security rule that blocks...

September 18, 2022 No Comments READ MORE +

Which of the following will allow different cloud instances to share various types of data with a minimal amount of complexity?

Which of the following will allow different cloud instances to share various types of data with a minimal amount of complexity?A . Reverse engineering B. Application log collectors C. Workflow orchestration D. API integration E. ScriptingView AnswerAnswer: D

September 18, 2022 No Comments READ MORE +

A cybersecurity analyst needs to rearchitect the network using a firewall and a VPN server to achieve the highest level of security.

A cybersecurity analyst needs to rearchitect the network using a firewall and a VPN server to achieve the highest level of security. To BEST complete this task, the analyst should place the:A . firewall behind the VPN server B. VPN server parallel to the firewall C. VPN server behind the...

September 18, 2022 No Comments READ MORE +

Which of the following would BEST accomplish this goal?

A cybersecurity analyst has access to several threat feeds and wants to organize them while simultaneously comparing intelligence against network traffic. Which of the following would BEST accomplish this goal?A . Continuous integration and deployment B. Automation and orchestration C. Static and dynamic analysis D. Information sharing and analysisView AnswerAnswer:...

September 18, 2022 No Comments READ MORE +

Which of the following solutions would meet this requirement?

A development team signed a contract that requires access to an on-premises physical server. Access must be restricted to authorized users only and cannot be connected to the Internet. Which of the following solutions would meet this requirement?A . Establish a hosted SSO. B. Implement a CASB. C. Virtualize the...

September 17, 2022 No Comments READ MORE +

Which of the following should be the team's NEXT step during the detection phase of this response process?

A team of security analysis has been alerted to potential malware activity. The initial examination indicates one of the affected workstations on beaconing on TCP port 80 to five IP addresses and attempting to spread across the network over port 445 . Which of the following should be the team's...

September 17, 2022 No Comments READ MORE +

Which of the following is the BEST solution?

A small organization has proprietary software that is used internally. The system has not been well maintained and cannot be updated with the rest of the environment. Which of the following is the BEST solution?A . Virtualize the system and decommission the physical machine. B. Remove it from the network...

September 17, 2022 No Comments READ MORE +