Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?
A startup company is using multiple SaaS and IaaS platform to stand up a corporate infrastructure and build out a customer-facing web application . Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?A . SIEMB . DLPC . CASBD . SWGView AnswerAnswer:...
On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)
On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)A . Data accessibilityB . Legal holdC . Cryptographic or hash algorithmD . Data retention legislationE . Value and volatility of dataF . Right-to-audit clausesView AnswerAnswer: E,F
Which of the following would MOST likely show where the malware originated?
A host was infected with malware. During the incident response, Joe, a user, reported that he did not receive any emails with links, but he had been browsing the Internet all day . Which of the following would MOST likely show where the malware originated?A . The DNS logsB ....
Which of the following attack vectors was MOST likely used in this scenario?
A user contacts the help desk to report the following: ✑ Two days ago, a pop-up browser window prompted the user for a name and password after connecting to the corporate wireless SSID. This had never happened before, but the user entered the information as requested. ✑ The user was...
Which of the following attacks MOST likely occurred on the original DNS server?
An organization’s help desk is flooded with phone calls from users stating they can no longer access certain websites. The help desk escalates the issue to the security team, as these websites were accessible the previous day. The security analysts run the following command: ipconfig /flushdns, but the issue persists....
Which of the following BEST explains the difference between a data owner and a data custodian?
Which of the following BEST explains the difference between a data owner and a data custodian?A . The data owner is responsible for adhering to the rules for using the data, while the data custodian is responsible for determining the corporate governance regarding the dataB . The data owner is...
Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?
A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO) . Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code...
Which of the following would BEST meet this need?
A security analyst is looking for a solution to help communicate to the leadership team the seventy levels of the organization’s vulnerabilities . Which of the following would BEST meet this need?A . CVEB . SIEMC . SOARD . CVSSView AnswerAnswer: D Explanation: The Common Vulnerability Scoring System (CVSS) is...
An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:
An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:A . business continuity planB . communications plan.C . disaster recovery plan.D . continuity of operations planView AnswerAnswer: C
Which of the following would BEST assist the company?
A small company that does not have security staff wants to improve its security posture . Which of the following would BEST assist the company?A . MSSPB . SOARC . IaaSD . PaaSView AnswerAnswer: B