Which of the following can be used to optimize the incident response time?

After multiple on premises security solutions were migrated to the cloud, the incident response time increased. The analyst are spending a long time to trace information on different cloud consoles and correlating data in different formats. Which of the following can be used to optimize the incident response time?A ....

January 29, 2023 No Comments READ MORE +

During an incident response, an analyst applied rules to all inbound traffic on the border firewall and implemented ACLs on each critical server Following an investigation, the company realizes it is still vulnerable because outbound traffic is not restricted and the adversary is able lo maintain a presence in the network. In which of the following stages of the Cyber Kill Chain is the adversary currently operating?

During an incident response, an analyst applied rules to all inbound traffic on the border firewall and implemented ACLs on each critical server Following an investigation, the company realizes it is still vulnerable because outbound traffic is not restricted and the adversary is able lo maintain a presence in the...

January 28, 2023 No Comments READ MORE +

Which of the following attack vectors BEST matches this malware?

An employee received a word processing file that was delivered as an email attachment. The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?A . Embedded Python code B. Macro-enabled file C. Bash scripting D. Credential-harvesting websiteView...

January 28, 2023 No Comments READ MORE +

Which of the following control types has the organization implemented?

An organization implemented a process that compares the settings currently configured on systems against secure configuration guidelines in order to identify any gaps. Which of the following control types has the organization implemented?A . Compensating B. Corrective C. Preventive D. DetectiveView AnswerAnswer: C Explanation: the control acts to eliminate or...

January 28, 2023 No Comments READ MORE +

Which of the following is MOST likely the result of the security analyst's review?

Several users have opened tickets with the help desk. The help desk has reassigned the tickets to a secunty analyst for further review. The security analyst reviews the following metrics: Which of the following is MOST likely the result of the security analyst's review?A . The ISP is dropping outbound...

January 28, 2023 No Comments READ MORE +

Which of the following would BEST describe the estimated number of devices to be replaced next year?

An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced...

January 28, 2023 No Comments READ MORE +

Which of the following would BEST provide a systems administrator with the ability to more efficiently identify systems and manage permissions and policies based on location, role, and service level?

Which of the following would BEST provide a systems administrator with the ability to more efficiently identify systems and manage permissions and policies based on location, role, and service level?A . Standard naming conventions B. Domain services C. Baseline configurations D. DiagramsView AnswerAnswer: C

January 28, 2023 No Comments READ MORE +

Which of the following 15 the technician's BEST course of action?

A help desk technician receives a phone call from someone claiming to be a part of the organization's cybersecurity modem response team The caller asks the technician to verify the network's internal firewall IP address. Which of the following 15 the technician's BEST course of action?A . Direct the caller...

January 27, 2023 No Comments READ MORE +

Which of the following can be used to safely assess the file?

A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether odified in transit before installation on the user's computer. Which of the following can be used to safely assess the file?A . Check the hash of the installation...

January 27, 2023 No Comments READ MORE +