<< Prev Question Next Question >>

Question 39/130

An incident response analyst is investigating the root cause of a recent malware outbreak. Initial binary analysis indicates that this malware disables host security services and performs cleanup routines on it infected hosts, including deletion of initial dropper and removal of event log entries and prefetch files from the host. Which of the following data sources would most likely reveal evidence of the root cause?
(Select two).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (130q)
Question 1: A company's security team is updating a section of the repor...
Question 2: A security analyst recently used Arachni to perform a vulner...
Question 3: Which of the following would help to minimize human engageme...
Question 4: A new cybersecurity analyst is tasked with creating an execu...
Question 5: While reviewing web server logs, a security analyst found th...
Question 6: A vulnerability analyst received a list of system vulnerabil...
Question 7: During an internal code review, software called "ACE" was di...
Question 8: A security analyst identified the following suspicious entry...
Question 9: A security analyst reviews the following results of a Nikto ...
Question 10: A security analyst needs to provide evidence of regular vuln...
Question 11: A small company does no! have enough staff to effectively se...
Question 12: A company has a primary control in place to restrict access ...
Question 13: A zero-day command injection vulnerability was published. A ...
Question 14: While performing a dynamic analysis of a malicious file, a s...
Question 15: When investigating a potentially compromised host, an analys...
Question 16: A security analyst reviews the latest vulnerability scans an...
Question 17: Which of the following tools would work best to prevent the ...
Question 18: A technician identifies a vulnerability on a server and appl...
Question 19: A cybersecurity analyst is doing triage in a SIEM and notice...
Question 20: A SOC analyst is analyzing traffic on a network and notices ...
Question 21: A security analyst received an alert regarding multiple succ...
Question 22: A security analyst is reviewing a packet capture in Wireshar...
Question 23: Which of the following is a benefit of the Diamond Model of ...
Question 24: A recent vulnerability scan resulted in an abnormally large ...
Question 25: Which of the following items should be included in a vulnera...
Question 26: An analyst views the following log entries: (Exhibit) The or...
Question 27: A security audit for unsecured network services was conducte...
Question 28: Which of the following techniques can help a SOC team to red...
Question 29: A company has the following security requirements: . No publ...
Question 30: A security analyst detects an exploit attempt containing the...
Question 31: A security analyst is reviewing the logs of a web server and...
Question 32: Which of the following would eliminate the need for differen...
Question 33: Which of the following is often used to keep the number of a...
Question 34: An organization is conducting a pilot deployment of an e-com...
Question 35: A penetration tester submitted data to a form in a web appli...
Question 36: Which of the following risk management principles is accompl...
Question 37: A cybersecurity analyst is reviewing SIEM logs and observes ...
Question 38: Which of the following best describes the reporting metric t...
Question 39: An incident response analyst is investigating the root cause...
Question 40: During a recent site survey. an analyst discovered a rogue w...
Question 41: While configuring a SIEM for an organization, a security ana...
Question 42: An analyst is designing a message system for a bank. The ana...
Question 43: An organization has activated the CSIRT. A security analyst ...
Question 44: You are a penetration tester who is reviewing the system har...
Question 45: An analyst discovers unusual outbound connections to an IP t...
Question 46: A Chief Information Security Officer has outlined several re...
Question 47: A vulnerability management team found four major vulnerabili...
Question 48: A security team identified several rogue Wi-Fi access points...
Question 49: A company's user accounts have been compromised. Users are a...
Question 50: Which of the following is the first step that should be perf...
Question 51: Which of the following would likely be used to update a dash...
Question 52: The analyst reviews the following endpoint log entry: (Exhib...
Question 53: Exploit code for a recently disclosed critical software vuln...
Question 54: A company receives a penetration test report summary from a ...
Question 55: Which of the following will most likely ensure that mission-...
Question 56: Which of the following makes STIX and OpenloC information re...
Question 57: The security operations team is required to consolidate seve...
Question 58: An employee is no longer able to log in to an account after ...
Question 59: Which of the following describes how a CSIRT lead determines...
Question 60: Due to an incident involving company devices, an incident re...
Question 61: Two employees in the finance department installed a freeware...
Question 62: An analyst is examining events in multiple systems but is ha...
Question 63: An employee downloads a freeware program to change the deskt...
Question 64: A company is deploying new vulnerability scanning software t...
Question 65: During a security test, a security analyst found a critical ...
Question 66: A SOC manager receives a phone call from an upset customer. ...
Question 67: While reviewing web server logs, a security analyst discover...
Question 68: A security analyst observed the following activity from a pr...
Question 69: Following a recent security incident, the Chief Information ...
Question 70: The vulnerability analyst reviews threat intelligence regard...
Question 71: A security analyst needs to mitigate a known, exploited vuln...
Question 72: After completing a review of network activity. the threat hu...
Question 73: During the log analysis phase, the following suspicious comm...
Question 74: A Chief Information Security Officer (CISO) wants to disable...
Question 75: An analyst is evaluating the following vulnerability report:...
Question 76: Patches for two highly exploited vulnerabilities were releas...
Question 77: A company is in the process of implementing a vulnerability ...
Question 78: An analyst is evaluating a vulnerability management dashboar...
Question 79: During an incident, analysts need to rapidly investigate by ...
Question 80: A security analyst discovers an LFI vulnerability that can b...
Question 81: AXSS vulnerability was reported on one of the non-sensitive/...
Question 82: A threat hunter seeks to identify new persistence mechanisms...
Question 83: An incident response analyst notices multiple emails travers...
Question 84: An analyst is conducting routine vulnerability assessments o...
Question 85: A SIEM alert is triggered based on execution of a suspicious...
Question 86: Following an incident, a security analyst needs to create a ...
Question 87: Which of the following would a security analyst most likely ...
Question 88: The security team reviews a web server for XSS and runs the ...
Question 89: Which of the following best describes the goal of a tabletop...
Question 90: An analyst is remediating items associated with a recent inc...
Question 91: A security analyst noticed the following entry on a web serv...
Question 92: An analyst is reviewing a vulnerability report and must make...
Question 93: A security analyst is reviewing the findings of the latest v...
Question 94: Which of the following describes a contract that is used to ...
Question 95: A cloud team received an alert that unauthorized resources w...
Question 96: Which of the following best describes the threat concept in ...
Question 97: The Chief Information Security Officer is directing a new pr...
Question 98: Security analysts review logs on multiple servers on a daily...
Question 99: Each time a vulnerability assessment team shares the regular...
Question 100: During security scanning, a security analyst regularly finds...
Question 101: A security analyst is performing an investigation involving ...
Question 102: Which of the following is described as a method of enforcing...
Question 103: A security analyst performs various types of vulnerability s...
Question 104: A security analyst is reviewing the following alert that was...
Question 105: A security analyst is validating a particular finding that w...
Question 106: The Chief Executive Officer of an organization recently hear...
Question 107: After a security assessment was done by a third-party consul...
Question 108: A security analyst is working on a server patch management p...
Question 109: A recent zero-day vulnerability is being actively exploited,...
Question 110: Which of the following concepts is using an API to insert bu...
Question 111: A security analyst obtained the following table of results f...
Question 112: During an incident, some loCs of possible ransomware contami...
Question 113: An organization recently changed its BC and DR plans. Which ...
Question 114: A technician is analyzing output from a popular network mapp...
Question 115: A security analyst at a company called ACME Commercial notic...
Question 116: Which of the following is an important aspect that should be...
Question 117: An organization enabled a SIEM rule to send an alert to a se...
Question 118: A company is in the process of implementing a vulnerability ...
Question 119: A security analyst performs a vulnerability scan. Based on t...
Question 120: A malicious actor has gained access to an internal network b...
Question 121: A security analyst detects an email server that had been com...
Question 122: A cybersecurity analyst notices unusual network scanning act...
Question 123: The developers recently deployed new code to three web serve...
Question 124: A security analyst has found the following suspicious DNS tr...
Question 125: Which of the following should be updated after a lessons-lea...
Question 126: Which of the following would help an analyst to quickly find...
Question 127: An employee accessed a website that caused a device to becom...
Question 128: During an extended holiday break, a company suffered a secur...
Question 129: A team of analysts is developing a new internal system that ...
Question 130: Which of following would best mitigate the effects of a new ...