<< Prev Question Next Question >>

Question 110/136

The Chief Information Officer (CIO) of a large healthcare institution is concerned about all machines having direct access to sensitive patient information. Which of the following should the security analyst implement to BEST mitigate the risk of sensitive data exposure?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (136q)
Question 1: A security analyst discovers suspicious host activity while ...
Question 2: A security analyst at a technology solutions firm has uncove...
Question 3: A monthly job to install approved vendor software updates an...
Question 4: A company stores all of its data in the cloud. All company-o...
Question 5: Which of the following are considered PH by themselves? (Sel...
Question 6: A security analyst for a large pharmaceutical company was gi...
Question 7: While planning segmentation for an ICS environment, a securi...
Question 8: An organization was alerted to a possible compromise after i...
Question 9: A security analyst is performing a Diamond Model analysis of...
Question 10: A large organization wants to move account registration serv...
Question 11: A general contractor has a list of contract documents contai...
Question 12: During routine monitoring, a security analyst discovers seve...
Question 13: A bad actor bypasses authentication and reveals all records ...
Question 14: An organization has not had an incident for several month. T...
Question 15: During a review of vulnerability scan results an analyst det...
Question 16: A small organization has proprietary software that is used i...
Question 17: A security analyst is evaluating two vulnerability managemen...
Question 18: During an incident investigation, a security analyst acquire...
Question 19: A company recently experienced financial fraud, which includ...
Question 20: Which of the following factors would determine the regulatio...
Question 21: A computer hardware manufacturer developing a new SoC that w...
Question 22: During an investigation, an incident responder intends to re...
Question 23: You are a cybersecurity analyst tasked with interpreting sca...
Question 24: After a remote command execution incident occurred on a web ...
Question 25: After a series of Group Policy Object updates, multiple serv...
Question 26: A large software company wants to move As source control and...
Question 27: A security analyst is reviewing the following requirements (...
Question 28: Which of the following is the MOST important objective of a ...
Question 29: A security analyst needs to develop a brief that will includ...
Question 30: An analyst receives artifacts from a recent Intrusion and is...
Question 31: A security analyst was alerted to a tile integrity monitorin...
Question 32: A security team wants to make SaaS solutions accessible from...
Question 33: Which of the following secure coding techniques can be used ...
Question 34: A storage area network (SAN) was inadvertently powered off w...
Question 35: You are a penetration tester who is reviewing the system har...
Question 36: An organization recently discovered some inconsistencies in ...
Question 37: While analyzing logs from a WAF, a cybersecurity analyst fin...
Question 38: A security analyst has observed several incidents within an ...
Question 39: Which of the following should a database administrator imple...
Question 40: An analyst needs to provide a recommendation that will allow...
Question 41: An organization's Chief Information Security Officer (CISO) ...
Question 42: The Chief information Officer of a large cloud software vend...
Question 43: The security team at a large corporation is helping the paym...
Question 44: To prioritize the morning's work, an analyst is reviewing se...
Question 45: A software developer is correcting the error-handling capabi...
Question 46: Which of the following technologies can be used to house the...
Question 47: Which of the following is the BEST way to share incident-rel...
Question 48: A company's application development has been outsourced to a...
Question 49: A security analyst at exampte.com receives a SIEM alert for ...
Question 50: A security analyst received a SIEM alert regarding high leve...
Question 51: A security analyst received a series of antivirus alerts fro...
Question 52: A security analyst is investigate an no client related to an...
Question 53: A company's Chief Information Security Officer (CISO) publis...
Question 54: An audit has revealed an organization is utilizing a large n...
Question 55: In system hardening, which of the following types of vulnera...
Question 56: A user reports the system is behaving oddly following the in...
Question 57: A company recently experienced a breach of sensitive informa...
Question 58: An analyst is reviewing the following code output of a vulne...
Question 59: While conducting a network infrastructure review, a security...
Question 60: A critical server was compromised by malware, and all functi...
Question 61: An organization that uses SPF has been notified emails sent ...
Question 62: A cyber-security analyst is implementing a new network confi...
Question 63: An organization is upgrading its network and all of its work...
Question 64: A security analyst has discovered malware is spreading acros...
Question 65: A security analyst is investigating malicious traffic from a...
Question 66: A help desk technician inadvertently sent the credentials of...
Question 67: A company's Chief Information Security Officer (CISO) is con...
Question 68: A security analyst is investigating a compromised Linux serv...
Question 69: A company creates digitally signed packages for its devices....
Question 70: An organization has several systems that require specific lo...
Question 71: A security analyst has a sample of malicious software and ne...
Question 72: Because some clients have reported unauthorized activity on ...
Question 73: An organization is focused on restructuring its data governa...
Question 74: Which of the following types of controls defines placing an ...
Question 75: SIMULATION Malware is suspected on a server in the environme...
Question 76: A cybersecurity analyst needs to rearchitect the network usi...
Question 77: A security analyst receives an alert from the SIEM about a p...
Question 78: A security analyst is supporting an embedded software team. ...
Question 79: Which of the following will allow different cloud instances ...
Question 80: During an incident response procedure, a security analyst co...
Question 81: A company recently experienced a break-in whereby a number o...
Question 82: An organisation is assessing risks so it can prioritize its ...
Question 83: A security analyst wants to identify which vulnerabilities a...
Question 84: The IT department is concerned about the possibility of a gu...
Question 85: An analyst must review a new cloud-based SIEM solution. Whic...
Question 86: Risk management wants IT to implement a solution that will p...
Question 87: Ann, a user, reports to the security team that her browser b...
Question 88: A security analyst is conceded that a third-party applicatio...
Question 89: A custom script currently monitors real-time logs of a SAMIL...
Question 90: A manufacturing company uses a third-party service provider ...
Question 91: During an incident, a cybersecurity analyst found several en...
Question 92: Ransomware is identified on a company's network that affects...
Question 93: As part of an organization's information security governance...
Question 94: A finance department employee has received a message that ap...
Question 95: A company has a cluster of web servers that is critical to t...
Question 96: While monitoring the information security notification mailb...
Question 97: An analyst is working with a network engineer to resolve a v...
Question 98: The threat intelligence department recently learned of an ad...
Question 99: industry partners from critical infrastructure organizations...
Question 100: An analyst is investigating an anomalous event reported by t...
Question 101: An information security analyst on a threat-hunting team Is ...
Question 102: Which of the following data security controls would work BES...
Question 103: Which of the following BEST articulates the benefit of lever...
Question 104: A pharmaceutical company's marketing team wants to send out ...
Question 105: An application server runs slowly and then triggers a high C...
Question 106: The Chief Information Officer (CIO) for a large manufacturin...
Question 107: An organization's network administrator uncovered a rogue de...
Question 108: A security analyst is reviewing a web application. If an una...
Question 109: During an investigation, a security analyst determines suspi...
Question 110: The Chief Information Officer (CIO) of a large healthcare in...
Question 111: A company's blocklist has outgrown the current technologies ...
Question 112: During an investigation, an analyst discovers the following ...
Question 113: A Chief Information Security Officer (CISO) is concerned the...
Question 114: A SIEM analyst receives an alert containing the following UR...
Question 115: An analyst is reviewing the following output as part of an i...
Question 116: A company wants to outsource a key human-resources applicati...
Question 117: An analyst is reviewing a list of vulnerabilities, which wer...
Question 118: A company's domain has been spooled in numerous phishing cam...
Question 119: A security analyst gathered forensics from a recent intrusio...
Question 120: Which of the following threat classifications would MOST lik...
Question 121: Understanding attack vectors and integrating intelligence so...
Question 122: A security architect is reviewing the options for performing...
Question 123: The help desk is having difficulty keeping up with all onboa...
Question 124: A remote code-execution vulnerability was discovered in the ...
Question 125: An incident response team detected malicious software that c...
Question 126: A cybersecurity analyst needs to determine whether a large f...
Question 127: A cybersecurity analyst is reading a daily intelligence dige...
Question 128: Which of the following BEST describes the primary role ol a ...
Question 129: An incident response team is responding to a breach of multi...
Question 130: An information security analyst is working with a data owner...
Question 131: An information security analyst is reviewing backup data set...
Question 132: A company has alerted planning the implemented a vulnerabili...
Question 133: A security analyst is looking at the headers of a few emails...
Question 134: A security analyst conducted a risk assessment on an organiz...
Question 135: A system administrator is doing network reconnaissance of a ...
Question 136: During a cyber incident, which of the following is the BEST ...