Which of the following describes what this code has done on the network?
A cybersecurity analyst has received the laptop of a user who recently left the company. The analyst types ‘history’ into the prompt, and sees this line of code in the latest bash history: This concerns the analyst because this subnet should not be known to users within the company ....
Which of the following tests should be performed NEXT?
A software patch has been released to remove vulnerabilities from company’s software. A security analyst has been tasked with testing the software to ensure the vulnerabilities have been remediated and the application is still functioning properly . Which of the following tests should be performed NEXT?A . FuzzingB . User...
CORRECT TEXT
CORRECT TEXT The developers recently deployed new code to three web servers. A daily automated external device scan report shows server vulnerabilities that are failing items according to PCI DSS. If the vulnerability is not valid, the analyst must take the proper steps to get the scan clean. If the...
Which of the following should the analyst implement?
An analyst has received unusual alerts on the SIEM dashboard. The analyst wants to get payloads that the hackers are sending toward the target systems without impacting the business operation . Which of the following should the analyst implement?A . HoneypotB . Jump boxC . SandboxingD . VirtualizationView AnswerAnswer: A
Prioritizing in order to reduce the risk of a breach to the organization, which of the following should be remediated FIRST?
A recent vulnerability scan found four vulnerabilities on an organization’s public Internet-facing IP addresses. Prioritizing in order to reduce the risk of a breach to the organization, which of the following should be remediated FIRST?A . A cipher that is known to be cryptographically weak.B . A website using a...
Which of the following steps should be taken to assist in the development of the disaster recovery plan?
An organization is requesting the development of a disaster recovery plan. The organization has grown and so has its infrastructure. Documentation, policies, and procedures do not exist . Which of the following steps should be taken to assist in the development of the disaster recovery plan?A . Conduct a risk...
Which of the following actions should occur to address any open issues while closing an incident involving various departments within the network?
Which of the following actions should occur to address any open issues while closing an incident involving various departments within the network?A . Incident response planB . Lessons learned reportC . Reverse engineering processD . Chain of custody documentationView AnswerAnswer: B
Which of the following should the analyst use?
An analyst wants to use a command line tool to identify open ports and running services on a host along with the application that is associated with those services and port . Which of the following should the analyst use?A . WiresharkB . QualysC . netstatD . nmapE . pingView...
Which of the following should the security analyst recommend to add additional security to this device?
A security analyst has determined that the user interface on an embedded device is vulnerable to common SQL injections. The device is unable to be replaced, and the software cannot be upgraded . Which of the following should the security analyst recommend to add additional security to this device?A ....
Which of the following ACLs, if implemented, will prevent further access ONLY to the unauthorized service and will not impact other services?
After reviewing the following packet, a cybersecurity analyst has discovered an unauthorized service is running on a company’s computer. Which of the following ACLs, if implemented, will prevent further access ONLY to the unauthorized service and will not impact other services?A . DENY TCP ANY HOST 10.38.219.20 EQ 3389B ....