Which of the following can be implemented to maintain the availability of the website?

A company has recently launched a new billing invoice website for a few key vendors. The cybersecurity analyst is receiving calls that the website is performing slowly and the pages sometimes time out. The analyst notices the website is receiving millions of requests, causing the service to become unavailable ....

July 3, 2021 No Comments READ MORE +

Once the analyst has located a patch for the vulnerability, which of the following should happen NEXT?

A security analyst has been asked to remediate a server vulnerability. Once the analyst has located a patch for the vulnerability, which of the following should happen NEXT?A . Start the change control process.B . Rescan to ensure the vulnerability still exists.C . Implement continuous monitoring.D . Begin the incident...

July 2, 2021 No Comments READ MORE +

Which of the following can a system administrator infer from the above output?

A system administrator has reviewed the following output: Which of the following can a system administrator infer from the above output?A . The company email server is running a non-standard port.B . The company email server has been compromised.C . The company is running a vulnerable SSH server.D . The...

July 2, 2021 No Comments READ MORE +

An administrator has been investigating the way in which an actor had been exfiltrating confidential data from a web server to a foreign host. After a thorough forensic review, the administrator determined the server’s BIOS had been modified by rootkit installation. After removing the rootkit and flashing the BIOS to a known good state, which of the following would BEST protect against future adversary access to the BIOS, in case another rootkit is installed?

An administrator has been investigating the way in which an actor had been exfiltrating confidential data from a web server to a foreign host. After a thorough forensic review, the administrator determined the server’s BIOS had been modified by rootkit installation. After removing the rootkit and flashing the BIOS to...

July 2, 2021 No Comments READ MORE +

Which of the following is MOST likely to be incorporated in the AUP?

A company wants to update its acceptable use policy (AUP) to ensure it relates to the newly implemented password standard, which requires sponsored authentication of guest wireless devices . Which of the following is MOST likely to be incorporated in the AUP?A . Sponsored guest passwords must be at least...

July 2, 2021 No Comments READ MORE +

Which of the following would be an indicator of a likely false positive?

An organization wants to remediate vulnerabilities associated with its web servers. An initial vulnerability scan has been performed, and analysts are reviewing the results. Before starting any remediation, the analysts want to remove false positives to avoid spending time on issues that are not actual vulnerabilities . Which of the...

July 1, 2021 No Comments READ MORE +

Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?

Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?A . Blue team training exercisesB . Technical control reviewsC . White team training exercisesD . Operational control reviewsView AnswerAnswer: A

July 1, 2021 No Comments READ MORE +

Creating a lessons learned report following an incident will help an analyst to communicate which of the following information? (Select TWO)

Creating a lessons learned report following an incident will help an analyst to communicate which of the following information? (Select TWO)A . Root cause analysis of the incident and the impact it had on the organizationB . Outline of the detailed reverse engineering steps for management to reviewC . Performance...

July 1, 2021 No Comments READ MORE +

Which of the following can be employed to allow this?

Company A permits visiting business partners from Company B to utilize Ethernet ports available in Company A’s conference rooms. This access is provided to allow partners the ability to establish VPNs back to Company B’s network. The security architect for Company A wants to ensure partners from Company B are...

July 1, 2021 No Comments READ MORE +

Which of the following is the MOST likely scenario causing these issues?

Several users have reported that when attempting to save documents in team folders, the following message is received: The File Cannot Be Copied or Moved C Service Unavailable. Upon further investigation, it is found that the syslog server is not obtaining log events from the file server to which the...

July 1, 2021 No Comments READ MORE +