Once the analyst has located a patch for the vulnerability, which of the following should happen NEXT?

A security analyst has been asked to remediate a server vulnerability. Once the analyst has located a patch for the vulnerability, which of the following should happen NEXT?A . Start the change control process.B . Rescan to ensure the vulnerability still exists.C . Implement continuous monitoring.D . Begin the incident...

March 13, 2020 No Comments READ MORE +

After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed.

After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed. This is an example...

March 13, 2020 No Comments READ MORE +

Which of the following is the BEST course of action based on the above warning and code snippet?

After scanning the main company’s website with the OWASP ZAP tool, a cybersecurity analyst is reviewing the following warning: The analyst reviews a snippet of the offending code: Which of the following is the BEST course of action based on the above warning and code snippet?A . The analyst should...

March 12, 2020 No Comments READ MORE +

Which of the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?

A threat intelligence feed has posted an alert stating there is a critical vulnerability in the kernel. Unfortunately, the company’s asset inventory is not current. Which of the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?A . A manual log review from data...

March 12, 2020 No Comments READ MORE +

Which of the following has occurred?

Review the following results: Which of the following has occurred?A . This is normal network traffic.B . 123.120.110.212 is infected with a Trojan.C . 172.29.0.109 is infected with a worm.D . 172.29.0.109 is infected with a Trojan.View AnswerAnswer: A

March 11, 2020 No Comments READ MORE +

Which of the following steps should be taken to prevent further disclosure of information about the breach?

Law enforcement has contacted a corporation’s legal counsel because correlated data from a breach shows the organization as the common denominator from all indicators of compromise. An employee overhears the conversation between legal counsel and law enforcement, and then posts a comment about it on social media. The media then...

March 11, 2020 No Comments READ MORE +

Which of the following techniques would BEST help the analyst accomplish this goal?

An analyst has initiated an assessment of an organization’s security posture. As a part of this review, the analyst would like to determine how much information about the organization is exposed externally. Which of the following techniques would BEST help the analyst accomplish this goal? (Select two.)A . FingerprintingB ....

March 11, 2020 No Comments READ MORE +

Which of the following actions should be taken to remediate this security issue?

A cybersecurity analyst is conducting a security test to ensure that information regarding the web server is protected from disclosure. The cybersecurity analyst requested an HTML file from the web server, and the Which of the following actions should be taken to remediate this security issue?A . Set “Allowlatescanning” to...

March 11, 2020 No Comments READ MORE +

Which of the following describes what this code has done on the network?

A cybersecurity analyst has received the laptop of a user who recently left the company. The analyst types ‘history’ into the prompt, and sees this line of code in the latest bash history: This concerns the analyst because this subnet should not be known to users within the company. Which...

March 10, 2020 No Comments READ MORE +

Which of the following should the analyst recommend to the company officer?

A security analyst is adding input to the incident response communication plan. A company officer has suggested that if a data breach occurs, only affected parties should be notified to keep an incident from becoming a media headline. Which of the following should the analyst recommend to the company officer?A...

March 10, 2020 No Comments READ MORE +