Which of the following control types does this BEST represent?
A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent?A . PreventiveB . CompensatingC . CorrectiveD . DetectiveView AnswerAnswer: D
Which of the following BEST describes this process?
A development team employs a practice of bringing all the code changes from multiple team members into the same development project through automation. A tool is utilized to validate the code and track source code through version control. Which of the following BEST describes this process?A . Continuous deliveryB ....
Which of the following resiliency techniques will provide these capabilities?
A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software compatibility issues. The Oss are still supported by the vendor, but the industrial software is no longer supported. The Chief Information Security Officer (CISO) has created a resiliency plan for...
Which of the following is the MOST likely cause of the issue?
An end user reports a computer has been acting slower than normal for a few weeks. During an investigation, an analyst determines the system is sending the user's email address and a ten-digit number to an IP address once a day. The only recent log entry regarding the user's computer...
Which of the following actions MOST likely supports an investigation for fraudulent submission?
A client sent several inquiries to a project manager about the delinquent delivery status of some critical reports. The project manager darned the reports were previously sent via email but then quickly generated and backdated the reports before submitting them via a new email message. Which of the following actions...
Which of the following can the security analyst conclude?
A security analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the early detection of attacks. The security analyst then reviews the following application log: Which of the following can the security analyst conclude?A . A replay attack is being...
Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?
Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?A . To provide data to quantity risk based on the organization's systems.B . To keep all software and hardware fully patched for known vulnerabilitiesC...
Which of the following sources of information would BEST support this solution?
An incident, which is affecting dozens of systems, involves malware that reaches out to an Internet service for rules and updates. The IP addresses for the Internet host appear to be different in each case. The organization would like to determine a common IoC to support response and recovery actions....
Which of the following is the BEST solution to protect these designs?
A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?A . An air gapB . A...
Which of the following BEST describes the type of attack that is occurring?
Given the following logs: Which of the following BEST describes the type of attack that is occurring?A . Rainbow tableB . DictionaryC . Password sprayingD . Pass-the-hashView AnswerAnswer: C