Which of the following best describes what the security program did?

A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?A . Data enrichmentB . Security control planeC . Threat feed combinationD...

February 27, 2025 No Comments READ MORE +

Which of the following can the analyst perform to see the entire contents of the downloaded files?

A security analyst is reviewing a packet capture in Wireshark that contains an FTP session from a potentially compromised machine. The analyst sets the following display filter: ftp. The analyst can see there are several RETR requests with 226 Transfer complete responses, but the packet list pane is not showing...

February 25, 2025 No Comments READ MORE +

Which of the following is an important aspect that should be included in the lessons-learned step after an incident?

Which of the following is an important aspect that should be included in the lessons-learned step after an incident?A . Identify any improvements or changes in the incident response plan or proceduresB . Determine if an internal mistake was made and who did it so they do not repeat the...

February 23, 2025 No Comments READ MORE +

Which of the following most likely describes the observed activity?

A company's user accounts have been compromised. Users are also reporting that the company's internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS. Which of the following most likely describes the observed activity?A . There is an issue with the SSL certificate causinq port...

February 19, 2025 No Comments READ MORE +

Which of the following will the SOC manager most likely recommend to help ensure new employees are accountable for following the company policy?

New employees in an organization have been consistently plugging in personal webcams despite the company policy prohibiting use of personal devices. The SOC manager discovers that new employees are not aware of the company policy. Which of the following will the SOC manager most likely recommend to help ensure new...

February 18, 2025 No Comments READ MORE +

Which of the following solutions will assist in reducing the risk?

The Chief Information Security Officer wants to eliminate and reduce shadow IT in the enterprise. Several high-risk cloud applications are used that increase the risk to the organization. Which of the following solutions will assist in reducing the risk?A . Deploy a CASB and enable policy enforcementB . Configure MFA...

February 18, 2025 No Comments READ MORE +

Which of the following items should be included in a vulnerability scan report? (Choose two.)

Which of the following items should be included in a vulnerability scan report? (Choose two.)A . Lessons learnedB . Service-level agreementC . PlaybookD . Affected hostsE . Risk scoreF . Education planView AnswerAnswer: D, E Explanation: A vulnerability scan report should include information about the affected hosts, such as their...

February 14, 2025 No Comments READ MORE +

Which of the following would be the best threat intelligence source to learn about this new campaign?

An analyst has been asked to validate the potential risk of a new ransomware campaign that the Chief Financial Officer read about in the newspaper. The company is a manufacturer of a very small spring used in the newest fighter jet and is a critical piece of the supply chain...

February 13, 2025 No Comments READ MORE +

Which of the following vulnerabilities should be patched first, given the above third-party scoring system?

A vulnerability management team is unable to patch all vulnerabilities found during their weekly scans. Using the third-party scoring system described below, the team patches the most urgent vulnerabilities: Additionally, the vulnerability management team feels that the metrics Smear and Channing are less important than the others, so these will...

February 13, 2025 No Comments READ MORE +

Which of the following tuning recommendations should the security analyst share?

An organization conducted a web application vulnerability assessment against the corporate website, and the following output was observed: Which of the following tuning recommendations should the security analyst share?A . Set an HttpOnlvflaq to force communication by HTTPSB . Block requests without an X-Frame-Options headerC . Configure an Access-Control-Allow-Origin header...

February 11, 2025 No Comments READ MORE +