<< Prev Question Next Question >>

Question 11/65

After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should the network security manager consult FIRST to determine a priority list for forensic review?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (65q)
Question 1: Which of the following is MOST likely to outline the roles a...
Question 2: A database administrator needs to ensure all passwords are s...
Question 3: The SOC is reviewing process and procedures after a recent i...
Question 4: A smart switch has the ability to monitor electrical levels ...
Question 5: An auditor is performing an assessment of a security applian...
Question 6: A Chief Security Officer (CSO) is concerned about the amount...
Question 7: Several employees return to work the day after attending an ...
Question 8: Which of the following technical controls is BEST suited for...
Question 9: The IT department at a university is concerned about profess...
Question 10: The CSIRT is reviewing the lessons learned from a recent inc...
Question 11: After reading a security bulletin, a network security manage...
Question 12: A security analyst discovers several .jpg photos from a cell...
Question 13: A network engineer is troubleshooting wireless network conne...
Question 14: A security analyst receives a SIEM alert that someone logged...
Question 15: A remote user recently took a two-week vacation abroad and b...
Question 16: A company recently added a DR site and is redesigning the ne...
Question 17: A malicious actor recently penetration a company's network a...
Question 18: A financial analyst is expecting an email containing sensiti...
Question 19: Which of the following ISO standards is certified for privac...
Question 20: A company provides mobile devices to its users to permit acc...
Question 21: A security analyst sees the following log output while revie...
Question 22: A document that appears to be malicious has been discovered ...
Question 23: In the middle of a cybersecurity, a security engineer remove...
Question 24: A cybersecurity analyst needs to implement secure authentica...
Question 25: A security analyst has received an alert about being sent vi...
Question 26: An organization is developing a plan in the event of a compl...
Question 27: A company has limited storage available and online presence ...
Question 28: A host was infected with malware. During the incident respon...
Question 29: A consultant is configuring a vulnerability scanner for a la...
Question 30: Which of the following allows for functional test data to be...
Question 31: A financial organization has adopted a new secure, encrypted...
Question 32: A security analyst is using a recently released security adv...
Question 33: An employee has been charged with fraud and is suspected of ...
Question 34: To secure an application after a large data breach, an e-com...
Question 35: A company recently moved sensitive videos between on-premise...
Question 36: The Chief Security Officer (CSO) at a major hospital wants t...
Question 37: A security analyst needs to produce a document that details ...
Question 38: A security engineer is reviewing log files after a third dis...
Question 39: A company wants to deploy PKI on its Internet-facing website...
Question 40: An enterprise has hired an outside security firm to conduct ...
Question 41: A company recently transitioned to a strictly BYOD culture d...
Question 42: Which of the following incident response steps involves acti...
Question 43: Which of the following is a team of people dedicated testing...
Question 44: When selecting a technical solution for identity management,...
Question 45: Which of the following would be BEST to establish between or...
Question 46: Which of the following refers to applications and systems th...
Question 47: A vulnerability assessment report will include the CVSS scor...
Question 48: An organization needs to implement more stringent controls o...
Question 49: A Chief Information Security Officer (CISO) is concerned abo...
Question 50: A network administrator needs to build out a new datacenter,...
Question 51: A company's Chief Information Office (CIO) is meeting with t...
Question 52: A recent audit uncovered a key finding regarding the use of ...
Question 53: An engineer wants to access sensitive data from a corporate-...
Question 54: Which of the following describes the ability of code to targ...
Question 55: A nuclear plant was the victim of a recent attack, and all t...
Question 56: A security analyst is performing a forensic investigation co...
Question 57: Which of the following cloud models provides clients with se...
Question 58: A security analyst is investigation an incident that was fir...
Question 59: A small business just recovered from a ransomware attack aga...
Question 60: A network administrator would like to configure a site-to-si...
Question 61: A security analyst is preparing a threat for an upcoming int...
Question 62: An organization with a low tolerance for user inconvenience ...
Question 63: The IT department's on-site developer has been with the team...
Question 64: A startup company is using multiple SaaS and IaaS platform t...
Question 65: A company recently set up an e-commerce portal to sell its p...