Which of the following should the analyst do NEXT?

CORRECT TEXT A security analyst has identified malv/are spreading through the corporate network and has activated the CSIRT. Which of the following should the analyst do NEXT? AA . Review how the malware was introduced to the network B. Attempt to quarantine all infected hosts to limit further spread C....

March 20, 2023 No Comments READ MORE +

Which of the following is the BEST mitigation strategy to prevent this from happening in the future?

A company recently experienced a significant data loss when proprietary Information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An Investigation confirmed the corporate network was not breached, but documents were downloaded...

March 20, 2023 No Comments READ MORE +

Which of the following attack vectors BEST matches this malware?

An employee received a word processing file that was delivered as an email attachment The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?A . Embedded Python code B. Macro-enabled file C. Bash scripting D. Credential-harvesting websiteView...

March 20, 2023 No Comments READ MORE +

Which of the following control types has the organization implemented?

An organization implemented a process that compares the settings currently configured on systems against secure configuration guidelines in order to identify any gaps. Which of the following control types has the organization implemented?A . Compensating B. Corrective C. Preventive D. DetectiveView AnswerAnswer: C Explanation: the control acts to eliminate or...

March 20, 2023 No Comments READ MORE +

An attack has occurred against a company

DRAG DROP An attack has occurred against a company. INSTRUCTIONS You have been tasked to do the following: Identify the type of attack that is occurring on the network by clicking on the attacker’s tablet and reviewing the output. (Answer Area 1). Identify which compensating controls should be implemented on...

March 20, 2023 No Comments READ MORE +

Which of the following will the blue team do after detecting an loC?

An organization has hired a ted team to simulate attacks on its security posture. Which of the following will the blue team do after detecting an loC?A . Reimage the impacted workstations B. Activate runbooks for incident response C. Conduct forensics on the compromised system D. Conduct passive reconnaissance to...

March 19, 2023 No Comments READ MORE +

For this reason which of the following features should the security team prioritize FIRST?

An amusement park is implementing a btomelnc system that validates customers' fingerpnnts to ensure they are not sharing tickets. The park's owner values customers above all and would prefer customers' convenience over security For this reason which of the following features should the security team prioritize FIRST?A . Low FAR...

March 19, 2023 No Comments READ MORE +

Which of the following would be BEST for the third-party vendor to provide to the CISO?

The Chief Information Security Officer (CISO) has requested that a third-party vendor provide supporting documents that show proper controls are in place to protect customer data. Which of the following would be BEST for the third-party vendor to provide to the CISO?A . GDPR compliance attestation B. Cloud Security Alliance...

March 19, 2023 No Comments READ MORE +

Which of the following is the MOST relevant security check to be performed before embedding third-parry libraries in developed code?

Which of the following is the MOST relevant security check to be performed before embedding third-parry libraries in developed code?A . Check to see if the third party has resources to create dedicated development and staging environments. B. Verify the number of companies that downloaded the third-party code and the...

March 19, 2023 No Comments READ MORE +

Which of Ihe following would mitigate the issue?

Multiple business accounts were compromised a few days after a public website had its credentials database leaked on the internet No business emails were Identified in the breach, but the security team thinks that the list of passwords exposed was later used to compromise business accounls. Which of Ihe following...

March 19, 2023 No Comments READ MORE +