Based on the output above, from which of the following process IDs can the analyst begin an investigation?
A security analyst is concerned that a malicious piece of code was downloaded on a Linux system. After some research, the analyst determines that the suspected piece of code is performing a lot of input/output (I/O) on the disk drive. Based on the output above, from which of the following...
Which of the following BEST describes the type of malware the solution should protect against?
A security analyst detected a malicious PowerShell attack on a single server. The malware used the Invoke-Expression function to execute an external malicious script. The security analyst scanned the disk with an antivirus application and did not find any IOCs. The security analyst now needs to deploy a protection solution...
Which of the following should the architect recommend to ensure all requirements are met in the MOST secure manner?
A security architect is reviewing the following proposed corporate firewall architecture and configuration: Both firewalls are stateful and provide Layer 7 filtering and routing. The company has the following requirements: Web servers must receive all updates via HTTP/S from the corporate network. Web servers should not initiate communication with the...
Which of the following meets the budget needs of the business?
A cybersecurity analyst created the following tables to help determine the maximum budget amount the business can justify spending on an improved email filtering system: Which of the following meets the budget needs of the business?A . Filter ABCB . Filter XYZC . Filter GHID . Filter TUVView AnswerAnswer: C
Which of the following should be the analyst’s FIRST action?
A security analyst is performing a vulnerability assessment on behalf of a client. The analyst must define what constitutes a risk to the organization. Which of the following should be the analyst’s FIRST action?A . Create a full inventory of information and data assets.B . Ascertain the impact of an...
Which of the following would BEST safeguard the APIs?
A development team created a mobile application that contacts a company’s back-end APIs housed in a PaaS environment. The APIs have been experiencing high processor utilization due to scraping activities. The security engineer needs to recommend a solution that will prevent and remedy the behavior. Which of the following would...
Which of the following is the MOST important cloud-specific risk from the CSP’s viewpoint?
Which of the following is the MOST important cloud-specific risk from the CSP’s viewpoint?A . Isolation control failureB . Management plane breachC . Insecure data deletionD . Resource exhaustionView AnswerAnswer: B
Which of the following encryption methods should the cloud security engineer select during the implementation phase?
A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used. The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security. Which of...
Which of the following BEST addresses the problem best address the problem with the least amount of administrative effort?
Over the last 90 days, many storage services has been exposed in the cloud services environments, and the security team does not have the ability to see is creating these instance. Shadow IT is creating data services and instances faster than the small security team can keep up with them....
Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?
A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment. Which of the...