Which of the following servers needs further investigation?

A security professional is analyzing the results of a network utilization report. The report includes the following information: Which of the following servers needs further investigation?A . hr.dbprod.01B . R&C . file.srvr.01D . mrktg.file.srvr.02E . web.srvr.03View AnswerAnswer: A

February 22, 2020 No Comments READ MORE +

Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?

A security analyst received a compromised workstation. The workstation’s hard drive may contain evidence of criminal activities. Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?A . Make a copy of the hard drive.B ....

February 22, 2020 No Comments READ MORE +

Which of the following courses of action would ONLY identify the known vulnerability?

An alert has been distributed throughout the information security community regarding a critical Apache vulnerability. Which of the following courses of action would ONLY identify the known vulnerability?A . Perform an unauthenticated vulnerability scan on all servers in the environment.B . Perform a scan for the specific vulnerability on all...

February 22, 2020 No Comments READ MORE +

Which of the following would be an indicator of a likely false positive?

An organization wants to remediate vulnerabilities associated with its web servers. An initial vulnerability scan has been performed, and analysts are reviewing the results. Before starting any remediation, the analysts want to remove false positives to avoid spending time on issues that are not actual vulnerabilities. Which of the following...

February 22, 2020 No Comments READ MORE +

Which of the following is the BEST logical control to address the failure?

An analyst finds that unpatched servers have undetected vulnerabilities because the vulnerability scanner does not have the latest set of signatures. Management directed the security team to have personnel update the scanners with the latest signatures at least 24 hours before conducting any scans, but the outcome is unchanged. Which...

February 21, 2020 No Comments READ MORE +

Which of the following describes what the analyst should do NEXT?

A security analyst has created an image of a drive from an incident. Which of the following describes what the analyst should do NEXT?A . The analyst should create a backup of the drive and then hash the drive.B . The analyst should begin analyzing the image and begin to...

February 21, 2020 No Comments READ MORE +

Prioritizing in order to reduce the risk of a breach to the organization, which of the following should be remediated FIRST?

A recent vulnerability scan found four vulnerabilities on an organization’s public Internet-facing IP addresses. Prioritizing in order to reduce the risk of a breach to the organization, which of the following should be remediated FIRST?A . A cipher that is known to be cryptographically weak.B . A website using a...

February 20, 2020 No Comments READ MORE +

A security analyst suspects that a workstation may be beaconing to a command and control server. Inspect the logs from the company’s web proxy server and the firewall to determine the best course of action to take in order to neutralize the threat with minimum impact to the organization

HOTSPOT A security analyst suspects that a workstation may be beaconing to a command and control server. Inspect the logs from the company’s web proxy server and the firewall to determine the best course of action to take in order to neutralize the threat with minimum impact to the organization....

February 19, 2020 1 Comment READ MORE +

Which of the following technologies meet the compatibility requirement?

An analyst was tasked with providing recommendations of technologies that are PKI X.509 compliant for a variety of secure functions. Which of the following technologies meet the compatibility requirement? (Select three.)A . 3DESB . AESC . IDEAD . PKCSE . PGPF . SSL/TLSG . TEMPESTView AnswerAnswer: BDF

February 19, 2020 No Comments READ MORE +

Which of the following should the analyst implement?

A cybersecurity analyst traced the source of an attack to compromised user credentials. Log analysis revealed that the attacker successfully authenticated from an unauthorized foreign country. Management asked the security analyst to research and implement a solution to help mitigate attacks based on compromised passwords. Which of the following should...

February 19, 2020 No Comments READ MORE +