Which of the following is the best way to ensure that the investigation complies with HR or privacy policies?

A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a terminable offense, the SOC analyst collects the authentication logs, web logs, and temporary files, reflecting the web searches from the user's workstation, to...

April 6, 2024 No Comments READ MORE +

Which of the following steps of an attack framework is the analyst witnessing?

An analyst finds that an IP address outside of the company network that is being used to run network and vulnerability scans across external-facing assets. Which of the following steps of an attack framework is the analyst witnessing?A . ExploitationB . ReconnaissanceC . Command and controlD . Actions on objectivesView...

April 6, 2024 No Comments READ MORE +

Which of the following is the best priority based on common attack frameworks?

The Chief Information Security Officer is directing a new program to reduce attack surface risks and threats as part of a zero trust approach. The IT security team is required to come up with priorities for the program. Which of the following is the best priority based on common attack...

April 6, 2024 No Comments READ MORE +

Which of the following would be the best way to locate this issue?

During an audit, several customer order forms were found to contain inconsistencies between the actual price of an item and the amount charged to the customer. Further investigation narrowed the cause of the issue to manipulation of the public-facing web form used by customers to order products. Which of the...

April 6, 2024 No Comments READ MORE +

Which of the following commands will best accomplish the analyst's objectives?

A security analyst wants to capture large amounts of network data that will be analyzed at a later time. The packet capture does not need to be in a format that is readable by humans, since it will be put into a binary file called "packetCapture." The capture must be...

April 6, 2024 No Comments READ MORE +

Which of the following types of media are most volatile and should be preserved?

A digital forensics investigator works from duplicate images to preserve the integrity of the original evidence. Which of the following types of media are most volatile and should be preserved? (Select two).A . Memory cacheB . Registry fileC . SSD storageD . Temporary filesystemsE . Packet decodingF . Swap volumeView...

April 6, 2024 No Comments READ MORE +

Which of the following is the user attempting to do based on the log entries?

A security analyst notices the following proxy log entries: Which of the following is the user attempting to do based on the log entries?A . Use a DoS attack on external hosts.B . Exfiltrate data.C . Scan the network.D . Relay email.View AnswerAnswer: D Explanation: Scanning the network is what the...

April 5, 2024 No Comments READ MORE +

Which of the following existing technical controls should a security analyst recommend to best meet all the requirements?

A Chief Information Officer wants to implement a BYOD strategy for all company laptops and mobile phones. The Chief Information Security Officer is concerned with ensuring all devices are patched and running some sort of protection against malicious software. Which of the following existing technical controls should a security analyst...

April 5, 2024 No Comments READ MORE +

Which of the following describes what the analyst has noticed?

An analyst notices there is an internal device sending HTTPS traffic with additional characters in the header to a known-malicious IP in another country. Which of the following describes what the analyst has noticed?A . BeaconingB . Cross-site scriptingC . Buffer overflowD . PHP traversalView AnswerAnswer: A Explanation:

April 5, 2024 No Comments READ MORE +

Which of the following systems should be prioritized for patching first?

An analyst is reviewing a vulnerability report for a server environment with the following entries: Which of the following systems should be prioritized for patching first?A . 10.101.27.98B . 54.73.225.17C . 54.74.110.26D . 54.74.110.228View AnswerAnswer: D Explanation: The system that should be prioritized for patching first is 54.74.110.228, as it...

April 5, 2024 No Comments READ MORE +