Which of the following items represents a document that includes detailed information on when an incident was detected, how impactful the incident was, and how it was remediated, in addition to incident response effectiveness and any identified gaps needing improvement?

Which of the following items represents a document that includes detailed information on when an incident was detected, how impactful the incident was, and how it was remediated, in addition to incident response effectiveness and any identified gaps needing improvement?A . Forensic analysis reportB . Chain of custody reportC ....

March 4, 2020 No Comments READ MORE +

Which of the following is the MOST secure solution to remediate this vulnerability?

A cybersecurity professional typed in a URL and discovered the admin panel for the e-commerce application is accessible over the open web with the default password. Which of the following is the MOST secure solution to remediate this vulnerability?A . Rename the URL to a more obscure name, whitelist all...

March 4, 2020 No Comments READ MORE +

Which of the following should the analyst implement?

An analyst has received unusual alerts on the SIEM dashboard. The analyst wants to get payloads that the hackers are sending toward the target systems without impacting the business operation. Which of the following should the analyst implement?A . HoneypotB . Jump boxC . SandboxingD . VirtualizationView AnswerAnswer: A

March 4, 2020 No Comments READ MORE +

Which of the following types of information should be considered based on information traditionally found in the SOW?

As part of an upcoming engagement for a client, an analyst is configuring a penetration testing application to ensure the scan complies with information defined in the SOW. Which of the following types of information should be considered based on information traditionally found in the SOW? (Select two.)A . Timing...

March 2, 2020 No Comments READ MORE +

An administrator has been investigating the way in which an actor had been exfiltrating confidential data from a web server to a foreign host. After a thorough forensic review, the administrator determined the server’s BIOS had been modified by rootkit installation. After removing the rootkit and flashing the BIOS to a known good state, which of the following would BEST protect against future adversary access to the BIOS, in case another rootkit is installed?

An administrator has been investigating the way in which an actor had been exfiltrating confidential data from a web server to a foreign host. After a thorough forensic review, the administrator determined the server’s BIOS had been modified by rootkit installation. After removing the rootkit and flashing the BIOS to...

March 2, 2020 No Comments READ MORE +

Which of the following BEST describes the type of threat in this situation?

An HR employee began having issues with a device becoming unresponsive after attempting to open an email attachment. When informed, the security analyst became suspicious of the situation, even though there was not any unusual behavior on the IDS or any alerts from the antivirus software. Which of the following...

March 2, 2020 No Comments READ MORE +

Which of the following is the MOST likely explanation for this?

A system administrator recently deployed and verified the installation of a critical patch issued by the company’s primary OS vendor. This patch was supposed to remedy a vulnerability that would allow an adversary to remotely execute code from over the network. However, the administrator just ran a vulnerability assessment of...

March 1, 2020 No Comments READ MORE +

Which of the following ACLs, if implemented, will prevent further access ONLY to the unauthorized service and will not impact other services?

After reviewing the following packet, a cybersecurity analyst has discovered an unauthorized service is running on a company’s computer. Which of the following ACLs, if implemented, will prevent further access ONLY to the unauthorized service and will not impact other services?A . DENY TCP ANY HOST 10.38.219.20 EQ 3389B ....

March 1, 2020 No Comments READ MORE +

Which of the following scanning topologies is BEST suited for this environment?

A university wants to increase the security posture of its network by implementing vulnerability scans of both centrally managed and student/employee laptops. The solution should be able to scale, provide minimum false positives and high accuracy of results, and be centrally managed through an enterprise console. Which of the following...

February 29, 2020 No Comments READ MORE +

Which of the following items should be in the report?

A cybersecurity analyst is completing an organization’s vulnerability report and wants it to reflect assets accurately. Which of the following items should be in the report?A . Processor utilizationB . Virtual hostsC . Organizational governanceD . Log dispositionE . Asset isolationView AnswerAnswer: B

February 29, 2020 No Comments READ MORE +