<< Prev Question Next Question >>

Question 13/135

A RAT that was used to compromise an organization's banking credentials was found on a user's computer.
The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set. Which of the following recommendations would BEST prevent this from reoccurring?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (135q)
Question 1: Which of the following refers to applications and systems th...
Question 2: A security analyst discovers that a company username and pas...
Question 3: Phishing and spear-phishing attacks have been occurring more...
Question 4: Which of the following would be BEST for a technician to rev...
Question 5: During a security assessment, a security finds a file with o...
Question 6: An organization's RPO for a critical system is two hours. Th...
Question 7: A network administrator is concerned about users being expos...
Question 8: A network engineer needs to build a solution that will allow...
Question 9: A forensics investigator is examining a number of unauthoriz...
Question 10: A security administrator suspects there may be unnecessary s...
Question 11: Which of the following is a reason why an organization would...
1 commentQuestion 12: A cybersecurity administrator needs to add disk redundancy f...
Question 13: A RAT that was used to compromise an organization's banking ...
Question 14: A Chief Security Officer (CSO) is concerned about the amount...
Question 15: A systems administrator needs to install a new wireless netw...
Question 16: A technician needs to prevent data loss in a laboratory. The...
Question 17: Which of the following should a data owner require all perso...
Question 18: A Chief Executive Officer's (CEO) personal information was s...
Question 19: Which of the following often operates in a client-server arc...
Question 20: A company's bank has reported that multiple corporate credit...
Question 21: An attacked is attempting to exploit users by creating a fak...
Question 22: A systems administrator needs to install the same X.509 cert...
Question 23: Which of the following environments minimizes end-user disru...
Question 24: A security analyst needs to be proactive in understand the t...
Question 25: A security analyst receives a SIEM alert that someone logged...
Question 26: A company is designing the layout of a new datacenter so it ...
Question 27: An organization is having difficulty correlating events from...
Question 28: A company's Chief Information Office (CIO) is meeting with t...
Question 29: A security engineer needs to implement an MDM solution that ...
Question 30: A company uses specially configured workstations tor any wor...
Question 31: A security analyst is reviewing a new website that will soon...
Question 32: A host was infected with malware. During the incident respon...
Question 33: A company just implemented a new telework policy that allows...
Question 34: After entering a username and password, and administrator mu...
Question 35: The spread of misinformation surrounding the outbreak of a n...
Question 36: A company has limited storage available and online presence ...
Question 37: The following are the logs of a successful attack. (Exhibit)...
Question 38: An enterprise needs to keep cryptographic keys in a safe man...
Question 39: To further secure a company's email system, an administrator...
Question 40: A security analyst Is hardening a Linux workstation and must...
Question 41: Employees are having issues accessing the company's website....
Question 42: Under GDPR, which of the following is MOST responsible for t...
Question 43: A network engineer notices the VPN concentrator overloaded a...
Question 44: A user reports constant lag and performance issues with the ...
Question 45: Users at organization have been installing programs from the...
Question 46: The security administrator has installed a new firewall whic...
Question 47: A company needs to centralize its logs to create a baseline ...
Question 48: A consultant is configuring a vulnerability scanner for a la...
Question 49: A security analyst needs to implement an MDM solution for BY...
Question 50: A security analyst must determine if either SSH or Telnet is...
Question 51: An attacker has successfully exfiltrated several non-salted ...
Question 52: A recent malware outbreak across a subnet included successfu...
Question 53: A security analyst needs to determine how an attacker was ab...
Question 54: During a routine scan of a wireless segment at a retail comp...
Question 55: A malicious actor recently penetration a company's network a...
Question 56: A security administrator is analyzing the corporate wireless...
Question 57: A security analyst has been reading about a newly discovered...
Question 58: A security architect at a large, multinational organization ...
Question 59: An organization has hired a security analyst to perform a pe...
Question 60: An organization has a growing workforce that is mostly drive...
Question 61: An organization routes all of its traffic through a VPN Most...
Question 62: A security analyst has received an alert about being sent vi...
Question 63: An organization regularly scans its infrastructure for missi...
Question 64: A symmetric encryption algorithm Is BEST suited for:...
Question 65: Which of the following technical controls is BEST suited for...
Question 66: An incident, which is affecting dozens of systems, involves ...
Question 67: An analyst needs to set up a method for securely transferrin...
Question 68: A small company that does not have security staff wants to i...
Question 69: A security analyst notices several attacks are being blocked...
Question 70: After consulting with the Chief Risk Officer (CRO). a manage...
Question 71: A security engineer needs to Implement the following require...
Question 72: A company uses wireless tor all laptops and keeps a very det...
Question 73: A security engineer at an offline government facility is con...
Question 74: While reviewing the wireless router, the systems administrat...
Question 75: The website http://companywebsite.com requires users to prov...
Question 76: A security analyst is performing a forensic investigation co...
Question 77: The concept of connecting a user account across the systems ...
Question 78: In the middle of a cybersecurity, a security engineer remove...
Question 79: n organization plans to transition the intrusion detection a...
Question 80: A company has drafted an insider-threat policy that prohibit...
Question 81: A university is opening a facility in a location where there...
Question 82: An organization is concerned that is hosted web servers are ...
Question 83: A financial organization has adopted a new secure, encrypted...
Question 84: A company has discovered unauthorized devices are using its ...
Question 85: Which of the following disaster recovery tests is The LEAST ...
Question 86: A large enterprise has moved all Hs data to the cloud behind...
Question 87: The new Chief Executive Officer (CEO) of a large company has...
Question 88: Under GDPR, which of the following is MOST responsible for t...
Question 89: Which of the following cloud models provides clients with se...
Question 90: While checking logs, a security engineer notices a number of...
Question 91: A nationwide company is experiencing unauthorized logins at ...
Question 92: Which of the following distributes data among nodes, making ...
Question 93: A security analyst is looking for a solution to help communi...
Question 94: A Chief Information Security Officer (CISO) is concerned abo...
Question 95: Which of the following are the MOST likely vectors for the u...
Question 96: A security analyst is reviewing the output of a web server l...
Question 97: A company's Chief Information Security Officer (CISO) recent...
Question 98: The CSIRT is reviewing the lessons learned from a recent inc...
Question 99: Following a prolonged datacenter outage that affected web-ba...
Question 100: A recent audit uncovered a key finding regarding the use of ...
Question 101: A security analyst is reviewing information regarding recent...
Question 102: A startup company is using multiple SaaS and IaaS platform t...
Question 103: A security administrator currently spends a large amount of ...
Question 104: A security analyst is reviewing logs on a server and observe...
Question 105: After installing a Windows server, a cybersecurity administr...
Question 106: Which of the following would BEST identify and remediate a d...
Question 107: An enterprise has hired an outside security firm to conduct ...
Question 108: An information security incident recently occurred at an org...
Question 109: When used at the design stage, which of the following improv...
Question 110: A major political party experienced a server breach. The hac...
Question 111: A security manager for a retailer needs to reduce the scope ...
Question 112: A security analyst is investigation an incident that was fir...
Question 113: A company wants to deploy PKI on its Internet-facing website...
Question 114: A security analyst is reviewing the following attack log out...
Question 115: A Chief Security Officer (CSO) was notified that a customer ...
Question 116: An end user reports a computer has been acting slower than n...
Question 117: Which of the following represents a biometric FRR?...
Question 118: A security modern may have occurred on the desktop PC of an ...
Question 119: Which of the following is the BEST reason to maintain a func...
Question 120: A SECURITY ANALYST NEEDS TO FIND REAL-TIME DATA ON THE LATES...
Question 121: An employee has been charged with fraud and is suspected of ...
Question 122: A security administrator checks the table of a network switc...
Question 123: Which of the following is MOST likely to outline the roles a...
Question 124: Which of the following utilize a subset of real data and are...
Question 125: To reduce costs and overhead, an organization wants to move ...
Question 126: A startup company is using multiple SaaS and IaaS platforms ...
Question 127: An organization just experienced a major cyberattack modem. ...
Question 128: A global company is experiencing unauthorized logging due to...
Question 129: During an incident response, a security analyst observes the...
Question 130: A company recently experienced an attack in which a maliciou...
Question 131: A company recently moved sensitive videos between on-premise...
Question 132: An organization is developing a plan in the event of a compl...
Question 133: A nuclear plant was the victim of a recent attack, and all t...
Question 134: A retail executive recently accepted a job with a major comp...
Question 135: An organization's Chief Security Officer (CSO) wants to vali...