Which of the following vulnerability options would BEST create the process requirements?

A security analyst is creating baseline system images to remediate vulnerabilities found in different operating systems. Each image needs to be scanned before it is deployed. The security analyst must ensure the configurations match industry standard benchmarks and the process can be repeated frequently . Which of the following vulnerability...

July 5, 2021 No Comments READ MORE +

Which of the following threats has the security analyst uncovered?

A security analyst is performing a forensic analysis on a machine that was the subject of some historic SIEM alerts. The analyst noticed some network connections utilizing SSL on non-common ports, copies of svchost.exe and cmd.exe in %TEMP% folder, and RDP files that had connected to external IPs . Which...

July 5, 2021 No Comments READ MORE +

Which of the following attacks has MOST likely occurred?

Using a heuristic system to detect an anomaly in a computer’s baseline, a system administrator was able to detect an attack even though the company signature based IDS and antivirus did not detect it. Further analysis revealed that the attacker had downloaded an executable file onto the company PC from...

July 4, 2021 No Comments READ MORE +

Which of the following threats did the engineer MOST likely uncover?

A reverse engineer was analyzing malware found on a retailer’s network and found code extracting track data in memory . Which of the following threats did the engineer MOST likely uncover?A . POS malwareB . RootkitC . Key loggerD . RansomwareView AnswerAnswer: A

July 4, 2021 No Comments READ MORE +

Which of the following recommendations would meet the needs of the organization?

The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local intranet. The CTO would like the capability to monitor all traffic to and from the gateway, as well as the capability to block certain content . Which of the following recommendations would meet the...

July 4, 2021 No Comments READ MORE +

Which of the following should the analyst check to ensure the policy is still accurate?

A cybersecurity analyst has been asked to follow a corporate process that will be used to manage vulnerabilities for an organization. The analyst notices the policy has not been updated in three years . Which of the following should the analyst check to ensure the policy is still accurate?A ....

July 4, 2021 No Comments READ MORE +

Which of the following is the security administrator practicing in this example?

A database administrator contacts a security administrator to request firewall changes for a connection to a new internal application. The security administrator notices that the new application uses a port typically monopolized by a virus. The security administrator denies the request and suggests a new port or service be used...

July 4, 2021 No Comments READ MORE +

Which of the following actions is the BEST approach for the analyst to perform?

A cybersecurity analyst has several SIEM event logs to review for possible APT activity. The analyst was given several items that include lists of indicators for both IP addresses and domains . Which of the following actions is the BEST approach for the analyst to perform?A . Use the IP...

July 4, 2021 No Comments READ MORE +

Which of the following would be an effective solution?

Management is concerned with administrator access from outside the network to a key server in the company. Specifically, firewall rules allow access to the server from anywhere in the company . Which of the following would be an effective solution?A . HoneypotB . Jump boxC . Server hardeningD . Anti-malwareView...

July 4, 2021 No Comments READ MORE +

Which of the following is the MOST secure solution to remediate this vulnerability?

A cybersecurity professional typed in a URL and discovered the admin panel for the e-commerce application is accessible over the open web with the default password . Which of the following is the MOST secure solution to remediate this vulnerability?A . Rename the URL to a more obscure name, whitelist...

July 3, 2021 No Comments READ MORE +