Which of the following is the most likely cause of the alerts?
A software company deployed a new application based on its internal code repository Several customers are reporting anti-malware alerts on workstations used to test the application. Which of the following is the most likely cause of the alerts? A. Misconfigured code commit B. Unsecure bundled libraries C. Invalid code signing...
Which of the following is the best option for a security architect to recommend?
A company wants to invest in research capabilities with the goal to operationalize the research output . Which of the following is the best option for a security architect to recommend? A. Dark web monitoring B. Threat intelligence platform C. Honeypots D. Continuous adversary emulationView AnswerAnswer: B Explanation: Investing in...
Which of the following best describes the cyberthreat to the bank?
A central bank implements strict risk mitigations for the hardware supply chain, including an allow list for specific countries of origin . Which of the following best describes the cyberthreat to the bank?A . Ability to obtain components during wartimeB . Fragility and other availability attacksC . Physical Implants and...
You are a security analyst tasked with interpreting an Nmap scan output from company’s privileged network.
You are a security analyst tasked with interpreting an Nmap scan output from company’s privileged network. The company’s hardening guidelines indicate the following: There should be one primary server or service per device. Only default ports should be used. Non-secure protocols should be disabled. INSTRUCTIONS Using the Nmap output, identify...
Which of the following best describes this type of correlation?
While reviewing recent modem reports, a security officer discovers that several employees were contacted by the same individual who impersonated a recruiter . Which of the following best describes this type of correlation?A . Spear-phishing campaignB . Threat modelingC . Red team assessmentD . Attack pattern analysisView AnswerAnswer: A Explanation:...
Which of the following best describes the cyberthreat to the bank?
A central bank implements strict risk mitigations for the hardware supply chain, including an allow list for specific countries of origin . Which of the following best describes the cyberthreat to the bank?A . Ability to obtain components during wartimeB . Fragility and other availability attacksC . Physical Implants and...
Which of the following is most likely The reason for the issue?
A user reports application access issues to the help desk. The help desk reviews the logs for the user Which of the following is most likely The reason for the issue?A . The user inadvertently tripped the impossible travel security rule in the SSO system.B . A threat actor has...
You are a security analyst tasked with interpreting an Nmap scan output from company’s privileged network.
You are a security analyst tasked with interpreting an Nmap scan output from company’s privileged network. The company’s hardening guidelines indicate the following: There should be one primary server or service per device. Only default ports should be used. Non-secure protocols should be disabled. INSTRUCTIONS Using the Nmap output, identify...
Which of the following actions should the security analyst take first?
A security analyst received a notification from a cloud service provider regarding an attack detected on a web server. The cloud service provider shared the following information about the attack: • The attack came from inside the network. • The attacking source IP was from the internal vulnerability scanners. •...
Which of the following best describes the cyberthreat to the bank?
A central bank implements strict risk mitigations for the hardware supply chain, including an allow list for specific countries of origin . Which of the following best describes the cyberthreat to the bank?A . Ability to obtain components during wartimeB . Fragility and other availability attacksC . Physical Implants and...