<< Prev Question Next Question >>

Question 165/178

Following a complete outage of the electronic medical record system for more than 18 hours, the hospital's Chief Executive Officer (CEO) has requested that the Chief Information Security Officer (CISO) perform an investigation into the possibility of a disgruntled employee causing the outage maliciously. To begin the investigation, the CISO pulls all event logs and device configurations from the time of the outage. The CISO immediately notices the configuration of a top-of-rack switch from one day prior to the outage does not match the configuration that was in place at the time of the outage. However, none of the event logs show who changed the switch configuration, and seven people have the ability to change it. Because of this, the investigation is inconclusive.
Which of the following processes should be implemented to ensure this information is available for future investigations?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (178q)
Question 1: An advanced threat emulation engineer is conducting testing ...
Question 2: The Chief Information Officer (CISO) is concerned that certa...
Question 3: A software development team is conducting functional and use...
Question 4: A technician is configuring security options on the mobile d...
Question 5: An organization relies heavily on third-party mobile applica...
Question 6: An organization based in the United States is planning to ex...
Question 7: A Chief Information Security Officer (CISO) has created a su...
Question 8: A security administrator wants to stand up a NIPS that is mu...
Question 9: Given the following output from a local PC: (Exhibit) Which ...
Question 10: First responders, who are part of a core incident response t...
Question 11: A remote user reports the inability to authenticate to the V...
Question 12: An attacker has been compromising banking institution target...
Question 13: A company has completed the implementation of technical and ...
Question 14: A technician is validating compliance with organizational po...
Question 15: A large, multinational company currently has two separate da...
Question 16: A secure facility has a server room that currently is contro...
Question 17: A Chief Information Security Officer (CISO) requests the fol...
Question 18: Following the merger of two large companies the newly combin...
Question 19: Users have been reporting unusual automated phone calls, inc...
Question 20: A security administrator is performing an audit of a local n...
Question 21: A company is implementing a new secure identity application,...
Question 22: A security engineer is making certain URLs from an internal ...
Question 23: A network engineer is upgrading the network perimeter and in...
Question 24: A government contractor was the victim of a malicious attack...
Question 25: Two competing companies experienced similar attacks on their...
Question 26: A managed service provider is designing a log aggregation se...
Question 27: A system owner has requested support from data owners to eva...
Question 28: A company's security policy states any remote connections mu...
Question 29: One of the objectives of a bank is to instill a security awa...
Question 30: A recent security assessment revealed a web application may ...
Question 31: The director of sales asked the development team for some sm...
Question 32: As part of an organization's ongoing vulnerability assessmen...
Question 33: An engineer wants to assess the OS security configurations o...
Question 34: As a result of an acquisition, a new development team is bei...
Question 35: A Chief Information Security Officer (CISO) is working with ...
Question 36: A company's chief cybersecurity architect wants to configure...
Question 37: A security technician receives a copy of a report that was o...
Question 38: A security administrator receives reports that several works...
Question 39: A cybersecurity analyst is hired to review the security the ...
Question 40: A smart switch has the ability to monitor electrical levels ...
Question 41: The board of a financial services company has requested that...
Question 42: Engineers at a company believe a certain type of data should...
Question 43: An engineer is evaluating the control profile to assign to a...
Question 44: A security engineer is performing an assessment again for a ...
Question 45: A core router was manipulated by a credentialed bypass to se...
Question 46: Several days after deploying an MDM for smartphone control, ...
Question 47: A company has gone through a round of phishing attacks. More...
Question 48: A security engineer is helping the web developers assess a n...
Question 49: A vulnerability was recently announced that allows a malicio...
Question 50: A security engineer must establish a method to assess compli...
Question 51: A penetration tester is trying to gain access to a remote sy...
Question 52: A security incident responder discovers an attacker has gain...
Question 53: A company recently deployed an agent-based DLP solution to a...
Question 54: A security is testing a server finds the following in the ou...
Question 55: A penetration test is being scoped for a set of web services...
Question 56: A company's human resources department recently had its own ...
Question 57: A security analyst has requested network engineers integrate...
Question 58: A security architect is determining the best solution for a ...
Question 59: Joe, a penetration tester, is assessing the security of an a...
Question 60: A vendor develops a mobile application for global customers....
Question 61: Ann, a corporate executive, has been the recent target of in...
Question 62: A network engineer is attempting to design-in resiliency cha...
Question 63: Providers at a healthcare system with many geographically di...
Question 64: A security consultant is considering authentication options ...
Question 65: As part of a systems modernization program, the use of a wea...
Question 66: There have been several exploits to critical devices within ...
Question 67: Following a recent data breach, a company has hired a new Ch...
Question 68: A team is at the beginning stages of designing a new enterpr...
Question 69: A security controls assessor intends to perform a holistic c...
Question 70: A security engineer is attempting to convey the importance o...
Question 71: A security consultant is performing a penetration test on ww...
Question 72: A company makes consumer health devices and needs to maintai...
Question 73: An internal penetration tester finds a legacy application th...
Question 74: A recent penetration test identified that a web server has a...
Question 75: An organization is currently performing a market scan for ma...
Question 76: An application development company implements object reuse t...
Question 77: A firewall specialist has been newly assigned to participate...
Question 78: Which of the following is an external pressure that causes c...
Question 79: A security administrator is updating a company's SCADA authe...
Question 80: A systems administrator recently joined an organization and ...
Question 81: An organization is in the process of evaluating service prov...
Question 82: Designing a system in which only information that is essenti...
Question 83: Which of the following are the MOST likely vectors for the u...
Question 84: Given the code snippet below: (Exhibit) Which of the followi...
Question 85: A vulnerability scan with the latest definitions was perform...
Question 86: A new security policy states all wireless and wired authenti...
Question 87: A company recently migrated to a SaaS-based email solution. ...
Question 88: A Chief Information Security Officer (CISO) needs to establi...
Question 89: An organization implemented a secure boot on its most critic...
Question 90: A forensic analyst suspects that a buffer overflow exists in...
Question 91: A company wants to secure a newly developed application that...
Question 92: After analyzing code, two developers al a company bring thes...
Question 93: An engineer is assisting with the design of a new virtualize...
Question 94: A creative services firm has a limited security budget and s...
Question 95: A systems administrator receives an advisory email that a re...
Question 96: A security engineer has been hired to design a device that w...
Question 97: A network administrator is concerned about a particular serv...
Question 98: Within change management, winch of the following ensures fun...
Question 99: A company has adopted and established a continuous-monitorin...
Question 100: After multiple service interruptions caused by an older data...
Question 101: A security analyst is troubleshooting a scenario in which an...
Question 102: The Chief Executive Officer (CEO) of a small startup company...
Question 103: After an employee was terminated, the company discovered the...
Question 104: A company recently experienced a period of rapid growth, and...
Question 105: A project manager is working with a software development gro...
Question 106: A manufacturing company recently recovered from an attack on...
Question 107: A systems administrator has installed a disk wiping utility ...
Question 108: A Chief Information Security Officer (CISO) is reviewing the...
Question 109: A security engineer has implemented an internal user access ...
Question 110: A security administrator is concerned about employees connec...
Question 111: A Chief Information Security Officer (CISO is reviewing and ...
Question 112: An attacker exploited an unpatched vulnerability in a web fr...
Question 113: The Chief Information Security Officer (CISO) of a company t...
Question 114: A security assessor is working with an organization to revie...
Question 115: Drag and drop the cloud deployment model to the associated u...
Question 116: Users have reported that an internally developed web applica...
Question 117: A manufacturing company's security engineer is concerned a r...
Question 118: Which of the following is the GREATEST security concern with...
Question 119: An international e-commerce company has identified attack tr...
Question 120: The email administrator must reduce the number of phishing e...
Question 121: During a recent incident, sensitive data was disclosed and s...
Question 122: A consultant is planning an assessment of a customer-develop...
Question 123: A security architect has been assigned to a new digital tran...
Question 124: An agency has implemented a data retention policy that requi...
Question 125: A deployment manager is working with a software development ...
Question 126: While investigating suspicious activity on a server, a secur...
Question 127: An enterprise is configuring an SSL client-based VPN for cer...
Question 128: As part of the development process for a new system, the org...
Question 129: An organization wants to arm its cybersecurity defensive sui...
Question 130: While conducting a BIA for a proposed acquisition, the IT in...
Question 131: An SQL database is no longer accessible online due to a rece...
Question 132: A security analyst is attempting to break into a client's se...
Question 133: A security analyst is reviewing the following pseudo-output ...
Question 134: A company is in the process of re-architecting its sensitive...
Question 135: Which of the following is a feature of virtualization that c...
Question 136: While attending a meeting with the human resources departmen...
Question 137: A company is purchasing an application that will be used to ...
Question 138: A PaaS provider deployed a new product using a DevOps method...
Question 139: The Chief Executive Officers (CEOs) from two different compa...
Question 140: An administrator wants to install a patch to an application....
Question 141: The legal department has required that all traffic to and fr...
Question 142: A cybersecurity analyst has received an alert that well-know...
Question 143: An enterprise is trying to secure a specific web-based appli...
Question 144: A company wants to implement a cloud-based security solution...
Question 145: In the past, the risk committee at Company A has shown an av...
Question 146: An information security officer is responsible for one secur...
Question 147: A laptop is recovered a few days after it was stolen. Which ...
Question 148: A developer needs to provide feedback on a peer's work durin...
Question 149: Joe an application security engineer is performing an audit ...
Question 150: An organization has recently deployed an EDR solution across...
Question 151: A security manager is determining the best DLP solution for ...
Question 152: A security administrator wants to allow external organizatio...
Question 153: An enterprise with global sites processes and exchanges high...
Question 154: A healthcare company wants to increase the value of the data...
Question 155: During an audit, it was determined from a sample that four o...
Question 156: A software development company lost customers recently becau...
Question 157: An investigation showed a worm was introduced from an engine...
Question 158: A breach was caused by an insider threat in which customer P...
Question 159: A security manager needed to protect a high-security data ce...
Question 160: An organization has employed the services of an auditing fir...
Question 161: An organization is implementing a virtualized thin-client so...
Question 162: A cloud architect needs to isolate the most sensitive portio...
Question 163: An organization is concerned that its hosted web servers are...
Question 164: A security engineer is deploying an IdP to broker authentica...
Question 165: Following a complete outage of the electronic medical record...
Question 166: A red team is able to connect a laptop with penetration test...
Question 167: A company enlists a trusted agent to implement a way to auth...
Question 168: Due to a recent breach, the Chief Executive Officer (CEO) ha...
Question 169: During the decommissioning phase of a hardware project, a se...
Question 170: A company has created a policy to allow employees to use the...
Question 171: Which of the following describes a contract that is used to ...
Question 172: Within the past six months, a company has experienced a seri...
Question 173: The Chief Information Security Officer (CISO) has asked the ...
Question 174: A recent assessment identified that several users' mobile de...
Question 175: To prepare for an upcoming audit, the Chief Information Secu...
Question 176: With which of the following departments should an engineer f...
Question 177: An information security manager conducted a gap analysis, wh...
Question 178: A company relies on an ICS to perform equipment monitoring f...