<< Prev Question Next Question >>

Question 52/104

During an investigation, a security analyst identified machines that are infected with malware the antivirus was unable to detect.
Which of the following is the BEST place to acquire evidence to perform data carving?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (104q)
Question 1: A security analyst is reviewing vulnerability scan results a...
Question 2: A finance department employee has received a message that ap...
Question 3: A web-based front end for a business intelligence applicatio...
Question 4: Which of the following will allow different cloud instances ...
Question 5: While reviewing log files, a security analyst uncovers a bru...
Question 6: An analyst is performing penetration testing and vulnerabili...
Question 7: Ransomware is identified on a company's network that affects...
Question 8: A security analyst needs to reduce the overall attack surfac...
Question 9: A user's computer has been running slowly when the user trie...
Question 10: Which of the following is the BEST way to share incident-rel...
Question 11: An organization suspects it has had a breach, and it is tryi...
Question 12: A company recently experienced financial fraud, which includ...
1 commentQuestion 13: An organization has not had an incident for several months. ...
Question 14: While analyzing network traffic, a security analyst discover...
Question 15: An application server runs slowly and then triggers a high C...
Question 16: A security analyst has observed several incidents within an ...
Question 17: A company just chose a global software company based in Euro...
Question 18: A cybersecurity analyst needs to rearchitect the network usi...
Question 19: An executive assistant wants to onboard a new cloud based pr...
Question 20: A security analyst is conceded that a third-party applicatio...
Question 21: An analyst is participating in the solution analysis process...
Question 22: Employees of a large financial company are continuously bein...
Question 23: A security analyst is reviewing the following requirements (...
Question 24: Which of the following technologies can be used to house the...
Question 25: During routine monitoring, a security analyst discovers seve...
Question 26: A company's blocklist has outgrown the current technologies ...
Question 27: A cybersecurity analyst is supposing an incident response ef...
Question 28: A company wants to establish a threat-hunting team. Which of...
Question 29: Bootloader malware was recently discovered on several compan...
Question 30: A network attack that is exploiting a vulnerability in the S...
Question 31: An analyst is reviewing the following output: (Exhibit) Whic...
Question 32: A security analyst is reviewing the following DNS logs as pa...
Question 33: In system hardening, which of the following types of vulnera...
Question 34: A cybersecurity analyst is dissecting an intrusion down to t...
Question 35: An analyst is investigating an anomalous event reported by t...
Question 36: A security analyst is reviewing the following web server log...
Question 37: Which of the following attacks can be prevented by using out...
Question 38: The help desk provided a security analyst with a screenshot ...
Question 39: A web developer wants to create a new web part within the co...
Question 40: A security team identified some specific known tactics and t...
Question 41: A company wants to reduce the cost of deploying servers to s...
Question 42: An analyst has been asked to provide feedback regarding the ...
Question 43: A security analyst suspects a malware infection was caused b...
Question 44: A security analyst needs to develop a brief that will includ...
Question 45: A company recently experienced multiple DNS DDoS attacks, an...
Question 46: A security manager has asked an analyst to provide feedback ...
Question 47: While analyzing logs from a WAF, a cybersecurity analyst fin...
Question 48: A Chief Security Officer (CSO) is working on the communicati...
Question 49: A security analyst discovers accounts in sensitive SaaS-base...
Question 50: A security analyst receives an alert that highly sensitive i...
Question 51: A team of security analysts has been alerted to potential ma...
Question 52: During an investigation, a security analyst identified machi...
Question 53: A system's authority to operate (ATO) is set to expire in fo...
Question 54: A security analyst reviews the latest reports from the compa...
Question 55: Which of the following is the MOST important objective of a ...
Question 56: A security analyst has been alerted to several emails that s...
Question 57: The help desk noticed a security analyst that emails from a ...
Question 58: Which of the following secure coding techniques can be used ...
Question 59: Which of the following data security controls would work BES...
Question 60: A small marketing firm uses many SaaS applications that hold...
Question 61: A security analyst received a series of antivirus alerts fro...
Question 62: A user reports the system is behaving oddly following the in...
Question 63: An analyst is working with a network engineer to resolve a v...
Question 64: A security analyst is researching an incident and uncovers s...
Question 65: A pharmaceutical company's marketing team wants to send out ...
Question 66: A Chief Information Security Officer (CISO) is concerned the...
Question 67: Which of the following BEST describes the primary role ol a ...
Question 68: A security analyst on the threat-hunting team has developed ...
Question 69: A cyber-incident response analyst is investigating a suspect...
Question 70: Which of the following technologies can be used to store dig...
Question 71: A custom script monitors real-time...
Question 72: A cybersecurity analyst is establishing a threat hunting and...
Question 73: An analyst is searching a log for potential credit card leak...
Question 74: While planning segmentation for an ICS environment, a securi...
Question 75: An analyst performs a routine scan of a host using Nmap and ...
Question 76: An organization is moving its infrastructure to the cloud in...
Question 77: A large software company wants to move as source control and...
Question 78: The steering committee for information security management a...
Question 79: A security analyst is investigating a compromised Linux serv...
Question 80: An information security analyst on a threat-hunting team Is ...
Question 81: A system administrator is doing network reconnaissance of a ...
Question 82: A security analyst is trying to determine if a host is activ...
Question 83: Joe, a penetration tester, used a professional directory to ...
Question 84: A security analyst has received reports of very slow, interm...
Question 85: A newly appointed Chief Information Security Officer (CISO) ...
Question 86: The inability to do remote updates of certificates, keys, so...
Question 87: A security analyst receives a CVE bulletin, which lists seve...
Question 88: A cybersecurity analyst is investigating a potential inciden...
Question 89: An audit has revealed an organization is utilizing a large n...
Question 90: An organization developed a comprehensive incident response ...
Question 91: A security analyst for a large financial institution is crea...
Question 92: An organisation is assessing risks so it can prioritize its ...
Question 93: A security analyst received an alert from the SIEM indicatin...
Question 94: During an investigation, an incident responder intends to re...
Question 95: A cybersecurity analyst is reading a daily intelligence dige...
Question 96: An organization's network administrator uncovered a rogue de...
Question 97: A contained section of a building is unable to connect to th...
Question 98: A security analyst has received information from a third-par...
Question 99: Which of the following should be found within an organizatio...
Question 100: A Chief Information Security Officer (CISO) is concerned abo...
Question 101: A cybersecurity analyst is currently checking a newly deploy...
Question 102: A human resources employee sends out a mass email to all emp...
Question 103: A security engineer is reviewing security products that iden...
Question 104: A security analyst conducted a risk assessment on an organiz...