Which of the following should the analyst do NEXT?
CORRECT TEXT A security analyst has identified malv/are spreading through the corporate network and has activated the CSIRT. Which of the following should the analyst do NEXT? AA . Review how the malware was introduced to the network B. Attempt to quarantine all infected hosts to limit further spread C....
Which of the following is the BEST mitigation strategy to prevent this from happening in the future?
A company recently experienced a significant data loss when proprietary Information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An Investigation confirmed the corporate network was not breached, but documents were downloaded...
Which of the following attack vectors BEST matches this malware?
An employee received a word processing file that was delivered as an email attachment The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?A . Embedded Python code B. Macro-enabled file C. Bash scripting D. Credential-harvesting websiteView...
Which of the following control types has the organization implemented?
An organization implemented a process that compares the settings currently configured on systems against secure configuration guidelines in order to identify any gaps. Which of the following control types has the organization implemented?A . Compensating B. Corrective C. Preventive D. DetectiveView AnswerAnswer: C Explanation: the control acts to eliminate or...
An attack has occurred against a company
DRAG DROP An attack has occurred against a company. INSTRUCTIONS You have been tasked to do the following: Identify the type of attack that is occurring on the network by clicking on the attacker’s tablet and reviewing the output. (Answer Area 1). Identify which compensating controls should be implemented on...
Which of the following will the blue team do after detecting an loC?
An organization has hired a ted team to simulate attacks on its security posture. Which of the following will the blue team do after detecting an loC?A . Reimage the impacted workstations B. Activate runbooks for incident response C. Conduct forensics on the compromised system D. Conduct passive reconnaissance to...
For this reason which of the following features should the security team prioritize FIRST?
An amusement park is implementing a btomelnc system that validates customers' fingerpnnts to ensure they are not sharing tickets. The park's owner values customers above all and would prefer customers' convenience over security For this reason which of the following features should the security team prioritize FIRST?A . Low FAR...
Which of the following would be BEST for the third-party vendor to provide to the CISO?
The Chief Information Security Officer (CISO) has requested that a third-party vendor provide supporting documents that show proper controls are in place to protect customer data. Which of the following would be BEST for the third-party vendor to provide to the CISO?A . GDPR compliance attestation B. Cloud Security Alliance...
Which of the following is the MOST relevant security check to be performed before embedding third-parry libraries in developed code?
Which of the following is the MOST relevant security check to be performed before embedding third-parry libraries in developed code?A . Check to see if the third party has resources to create dedicated development and staging environments. B. Verify the number of companies that downloaded the third-party code and the...
Which of Ihe following would mitigate the issue?
Multiple business accounts were compromised a few days after a public website had its credentials database leaked on the internet No business emails were Identified in the breach, but the security team thinks that the list of passwords exposed was later used to compromise business accounls. Which of Ihe following...