Which of the following describes the type of vulnerability that was MOST likely expiated?

A security analyst is investigating a system compromise. The analyst verities the system was up to date on OS patches at the time of the compromise. Which of the following describes the type of vulnerability that was MOST likely expiated?A . Insider threat B. Buffer overflow C. Advanced persistent threat...

December 9, 2022 No Comments READ MORE +

Which of the following BEST describes the method used by each tool?

A security analyst is evaluating two vulnerability management tools for possible use in an organization. The analyst set up each of the tools according to the respective vendor's instructions and generated a report of vulnerabilities that ran against the same target server. Tool A reported the following: Tool B reported...

December 9, 2022 No Comments READ MORE +

Which of the following is the MOST important objective of a post-incident review?

Which of the following is the MOST important objective of a post-incident review?A . Capture lessons learned and improve incident response processes B. Develop a process for containment and continue improvement efforts C. Identify new technologies and strategies to remediate D. Identify a new management strategyView AnswerAnswer: A

December 9, 2022 No Comments READ MORE +

Which of the following lines indicates the computer may be compromised?

A user's computer has been running slowly when the user tries to access web pages. A security analyst runs the command netstat -aon from the command line and receives the following output: Which of the following lines indicates the computer may be compromised?A . Line 1 B. Line 2 C....

December 9, 2022 No Comments READ MORE +

Which of the following should be the focus of the investigation?

An organization was alerted to a possible compromise after its proprietary data was found for sale on the Internet. An analyst is reviewing the logs from the next-generation UTM in an attempt to find evidence of this breach. Given the following output: Which of the following should be the focus...

December 9, 2022 No Comments READ MORE +

Which of the following commands should the analyst investigate FIRST?

During a routine log review, a security analyst has found the following commands that cannot be identified from the Bash history log on the root user. Which of the following commands should the analyst investigate FIRST?A . Line 1 B. Line 2 C. Line 3 D. Line 4 E. Line...

December 8, 2022 No Comments READ MORE +

Which of the following should the analyst provide an assessment of?

An analyst has been asked to provide feedback regarding the control required by a revised regulatory framework At this time, the analyst only needs to focus on the technical controls. Which of the following should the analyst provide an assessment of?A . Tokenization of sensitive data B. Establishment o' data...

December 8, 2022 No Comments READ MORE +

Which of the following roles is ultimately responsible for determining the classification levels assigned to specific data sets?

Which of the following roles is ultimately responsible for determining the classification levels assigned to specific data sets?A . Data custodian B. Data owner C. Data processor D. Senior managementView AnswerAnswer: B Explanation: Reference: https://www.pearsonitcertification.com/articles/article.aspx?p=2731933&seqNum=3

December 8, 2022 No Comments READ MORE +

After reviewing the results the manager requests information regarding the possible exploitation of vulnerabilities Much of the following information data points would be MOST useful for the analyst to provide to the security manager who would then communicate the risk factors to senior management?

A security manager has asked an analyst to provide feedback on the results of a penetration lest. After reviewing the results the manager requests information regarding the possible exploitation of vulnerabilities Much of the following information data points would be MOST useful for the analyst to provide to the security...

December 8, 2022 No Comments READ MORE +

Which of the following will fix the cause of the issue?

A web-based front end for a business intelligence application uses pass-through authentication to authenticate users. The application then uses a service account, to perform queries and look up data m a database A security analyst discovers employees are accessing data sets they have not been authorized to use. Which of...

December 8, 2022 No Comments READ MORE +