<< Prev Question Next Question >>

Question 5/21

An incident response team is recommending changes after analyzing a recent compromise in which:
a large number of events and logs were involved;
team members were not able to identify the anomalous behavior and escalate it in a timely manner; several network systems were affected as a result of the latency in detection; security engineers were able to mitigate the threat and bring systems back to a stable state; and the issue reoccurred shortly after and systems became unstable again because the correct information was not gathered during the initial identification phase.
Which two recommendations should be made for improving the incident response process? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (21q)
Question 1: What is the goal of an incident response plan?...
Question 2: What is the transmogrify anti-forensics technique?...
Question 3: What is the steganography anti-forensics technique?...
Question 4: Drag and drop the steps from the left into the order to perf...
Question 5: An incident response team is recommending changes after anal...
Question 6: Refer to the exhibit. (Exhibit) What should be determined fr...
Question 7: Refer to the exhibit. (Exhibit) Which encoding technique is ...
Question 8: Refer to the exhibit. (Exhibit) An engineer is analyzing a ....
Question 9: Refer to the exhibit. (Exhibit) After a cyber attack, an eng...
Question 10: Refer to the exhibit. (Exhibit) What is the IOC threat and U...
Question 11: What are YARA rules based upon?...
Question 12: Which technique is used to evade detection from security pro...
Question 13: Refer to the exhibit. (Exhibit) Which element in this email ...
Question 14: A security team receives reports of multiple files causing s...
Question 15: What is a concern for gathering forensics evidence in public...
Question 16: A threat actor attempts to avoid detection by turning data i...
Question 17: Refer to the exhibit. (Exhibit) What do these artifacts indi...
Question 18: A security team received an alert of suspicious activity on ...
Question 19: Refer to the exhibit. (Exhibit) Which type of code is being ...
Question 20: A website administrator has an output of an FTP session that...
Question 21: Refer to the exhibit. (Exhibit) An HR department submitted a...