<< Prev Question Next Question >>

Question 26/74

A security analyst is receiving several alerts per user and is trying to determine If various logins are malicious. The security analyst would like to create a baseline of normal operations and reduce noise. Which of the following actions should the security analyst perform?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (74q)
Question 1: A company wants to restrict emailing of PHI documents. The c...
Question 2: Which of the following is an example of transference of risk...
Question 3: During an incident response process involving a laptop, a ho...
Question 4: To reduce and limit software and infrastructure costs, the C...
Question 5: Which of the following is the MOST relevant security check t...
Question 6: Several attempts have been made lo pick the door lock of a s...
Question 7: Which of the following is the MOST effective control against...
Question 8: An organization wants to implement a biometric system with t...
Question 9: After gaining access to a dual-homed (i.e.. wired and wirele...
Question 10: An engineer wants to inspect traffic to a cluster of web ser...
Question 11: A help desk technician receives a phone call from someone cl...
Question 12: An analyst receives multiple alerts for beaconing activity f...
Question 13: Field workers in an organization are issued mobile phones on...
Question 14: Which of the following is a benefit of including a risk mana...
Question 15: A company has a flat network in the cloud. The company needs...
Question 16: Which of the following documents provides expectations at a ...
Question 17: Which of the following are common VoIP-associated vulnerabil...
Question 18: An organization discovered files with proprietary financial ...
Question 19: A company is considering transitioning to the cloud. The com...
Question 20: After reluming from a conference, a user's laptop has been o...
Question 21: Data exftitration analysis indicates that an attacker manage...
Question 22: An administrator needs to protect user passwords and has bee...
Question 23: Which of the following components can be used to consolidate...
Question 24: Which of the following will increase cryptographic security?...
Question 25: A security analyst is tasked with defining the "something yo...
Question 26: A security analyst is receiving several alerts per user and ...
Question 27: A technician enables full disk encryption on a laptop that w...
Question 28: Several users have opened tickets with the help desk. The he...
Question 29: A security manager has tasked the security operations center...
Question 30: A security analyst wants to fingerpnnt a web server Which of...
Question 31: While preparing a software Inventory report, a security anal...
Question 32: An organization implemented a process that compares the sett...
Question 33: An organization is planning lo open other data centers to su...
Question 34: A company wants to improve end users experiences when they t...
Question 35: A help desk technician receives a phone call from someone cl...
Question 36: A company is looking to migrate some servers to the cloud to...
Question 37: Certain users are reporting their accounts are being used to...
Question 38: Security analysts are conducting an investigation of an atta...
Question 39: A security analyst is designing the appropnate controls to l...
Question 40: Which of the following BEST reduces the security risks intro...
Question 41: An organization has hired a ted team to simulate attacks on ...
Question 42: A security engineer is concerned about using an agent on dev...
Question 43: Which of the following is the MOST effective way to detect s...
Question 44: A software company adopted the following processes before re...
Question 45: DRAG DROP An attack has occurred against a company. INSTRUCT...
Question 46: Which of the following tools is effective in preventing a us...
Question 47: A junior security analyst iss conducting an analysis after p...
Question 48: Which of the following control types is focused primarily on...
Question 49: Which of the following should be monitored by threat intelli...
Question 50: Which of the following describes the exploitation of an inte...
Question 51: Which of the following is used to ensure that evidence is ad...
Question 52: A security analyst is investigating suspicious traffic on th...
Question 53: A DBA reports that several production server hard drives wer...
Question 54: Which of the following would detect intrusions at the perime...
Question 55: A user enters a username and a password at the login screen ...
Question 56: Select the appropriate attack and remediation from each drop...
Question 57: A large financial services firm recently released informatio...
Question 58: The Chief Information Secunty Officer (CISO) requested a rep...
Question 59: As part of a security compliance assessment, an auditor perf...
Question 60: An engineer recently deployed a group of 100 web servers in ...
Question 61: An employee received a word processing file that was deliver...
Question 62: An organization maintains several environments in which patc...
Question 63: While reviewing an alert that shows a malicious request on o...
Question 64: A company is receiving emails with links to phishing sites t...
Question 65: During a recent penetration test, the tester discovers large...
Question 66: A security analyst is evaluating the risks of authorizing mu...
Question 67: During a trial, a judge determined evidence gathered from a ...
Question 68: After a recent security breach, a security analyst reports t...
Question 69: A security analyst in a SOC has been tasked with onboarding ...
Question 70: A security policy states that common words should not be use...
Question 71: An organization is building backup server rooms in geographi...
Question 72: A company is required to continue using legacy software to s...
Question 73: Which of the following terms describes a broad range of info...
Question 74: A security engineer is deploying a new wireless for a compan...