<< Prev Question Next Question >>

Question 83/150

SIMULATION
Approximately 100 employees at your company have received a Phishing email. AS a security analyst. you have been tasked with handling this Situation.



Review the information provided and determine the following:
1. HOW many employees Clicked on the link in the Phishing email?
2. on how many workstations was the malware installed?
3. what is the executable file name of the malware?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
Question 1: During a scan of a web server in the perimeter network, a vu...
Question 2: A security analyst noticed the following entry on a web serv...
Question 3: A company is in the process of implementing a vulnerability ...
Question 4: A disgruntled open-source developer has decided to sabotage ...
Question 5: A vulnerability scan of a web server that is exposed to the ...
Question 6: A security analyst is performing an investigation involving ...
Question 7: Which of the following would help to minimize human engageme...
Question 8: A cybersecurity analyst has been assigned to the threat-hunt...
Question 9: A systems administrator receives reports of an internet-acce...
Question 10: SIMULATION A healthcare organization must develop an action ...
Question 11: Joe, a leading sales person at an organization, has announce...
Question 12: An analyst is designing a message system for a bank. The ana...
Question 13: A security analyst received an alert regarding multiple succ...
Question 14: A cybersecurity analyst has recovered a recently compromised...
Question 15: Which of the following best describes the key elements of a ...
Question 16: An analyst has been asked to validate the potential risk of ...
Question 17: Which of the following best describes the goal of a tabletop...
Question 18: An incident response analyst is investigating the root cause...
Question 19: A company is implementing a vulnerability management program...
Question 20: Which of the following explains the importance of a timeline...
Question 21: A security analyst is reviewing the following alert that was...
Question 22: A small company does no! have enough staff to effectively se...
Question 23: An analyst is suddenly unable to enrich data from the firewa...
Question 24: Which of the following would likely be used to update a dash...
Question 25: The analyst reviews the following endpoint log entry: (Exhib...
Question 26: Which of the following would eliminate the need for differen...
Question 27: A malicious actor has gained access to an internal network b...
Question 28: An analyst is reviewing a vulnerability report for a server ...
Question 29: A security analyst detects an email server that had been com...
Question 30: A security administrator has been notified by the IT operati...
Question 31: An employee is no longer able to log in to an account after ...
Question 32: A security analyst receives an alert for suspicious activity...
Question 33: While reviewing the web server logs, a security analyst noti...
Question 34: Which of the following phases of the Cyber Kill Chain involv...
Question 35: A recent vulnerability scan resulted in an abnormally large ...
Question 36: Which of the following best describes the document that defi...
Question 37: While reviewing web server logs, a security analyst discover...
Question 38: A Chief Information Security Officer wants to implement secu...
Question 39: An employee accessed a website that caused a device to becom...
Question 40: During a cybersecurity incident, one of the web servers at t...
Question 41: A manufacturer has hired a third-party consultant to assess ...
Question 42: An organization's email account was compromised by a bad act...
Question 43: A security manager is looking at a third-party vulnerability...
Question 44: An organization has established a formal change management p...
Question 45: During an incident, a security analyst discovers a large amo...
Question 46: The Chief Information Security Officer is directing a new pr...
Question 47: When starting an investigation, which of the following must ...
Question 48: A security analyst is trying to identify anomalies on the ne...
Question 49: A security analyst is validating a particular finding that w...
Question 50: An organization was compromised, and the usernames and passw...
Question 51: Which of the following is often used to keep the number of a...
Question 52: A cybersecurity analyst is reviewing SIEM logs and observes ...
Question 53: An organization is conducting a pilot deployment of an e-com...
Question 54: An email hosting provider added a new data center with new p...
Question 55: Several critical bugs were identified during a vulnerability...
Question 56: During an extended holiday break, a company suffered a secur...
Question 57: Which of the following is the best metric for an organizatio...
Question 58: An organization's threat intelligence team notes a recent tr...
Question 59: A security analyst reviews the following extract of a vulner...
Question 60: The Chief Information Security Officer wants to eliminate an...
Question 61: Which of the following will most likely ensure that mission-...
Question 62: An analyst is conducting routine vulnerability assessments o...
Question 63: A security analyst would like to integrate two different Saa...
Question 64: A security analyst is writing a shell script to identify IP ...
Question 65: Which of the following is a reason why proper handling and r...
Question 66: A security analyst detects an exploit attempt containing the...
Question 67: A team of analysts is developing a new internal system that ...
Question 68: An analyst reviews a recent government alert on new zero-day...
Question 69: A security analyst reviews the following Arachni scan result...
Question 70: A recent zero-day vulnerability is being actively exploited,...
Question 71: Which of the following is described as a method of enforcing...
Question 72: During a tabletop exercise, engineers discovered that an ICS...
Question 73: Which of the following is the most important factor to ensur...
Question 74: An attacker recently gained unauthorized access to a financi...
Question 75: A security analyst reviews the latest vulnerability scans an...
Question 76: A company is concerned with finding sensitive file storage l...
Question 77: New employees in an organization have been consistently plug...
Question 78: A security analyst needs to provide evidence of regular vuln...
Question 79: Which of the following stakeholders are most likely to recei...
Question 80: Which of the following tools would work best to prevent the ...
Question 81: A Chief Information Security Officer (CISO) is concerned tha...
Question 82: Which of the following best describes the importance of impl...
Question 83: SIMULATION Approximately 100 employees at your company have ...
Question 84: After a security assessment was done by a third-party consul...
Question 85: The Chief Information Security Officer (CISO) of a large man...
Question 86: An analyst finds that an IP address outside of the company n...
Question 87: Which of the following is a commonly used four-component fra...
Question 88: During normal security monitoring activities, the following ...
Question 89: When undertaking a cloud migration of multiple SaaS applicat...
Question 90: A security analyst is trying to validate the results of a we...
Question 91: Which of the following is an important aspect that should be...
Question 92: Which of the following actions would an analyst most likely ...
Question 93: Which of the following concepts is using an API to insert bu...
Question 94: An organization conducted a web application vulnerability as...
Question 95: An older CVE with a vulnerability score of 7.1 was elevated ...
Question 96: A systems administrator is reviewing after-hours traffic flo...
Question 97: A security analyst is trying to identify possible network ad...
Question 98: Which Of the following techniques would be best to provide t...
Question 99: A security analyst discovers an LFI vulnerability that can b...
Question 100: An employee is no longer able to log in to an account after ...
Question 101: An incident response analyst is taking over an investigation...
Question 102: Which of the following can be used to learn more about TTPs ...
Question 103: Which of the following security operations tasks are ideal f...
Question 104: A cybersecurity team lead is developing metrics to present i...
Question 105: During an incident, analysts need to rapidly investigate by ...
Question 106: Several reports with sensitive information are being disclos...
Question 107: A company brings in a consultant to make improvements to its...
Question 108: A company is launching a new application in its internal net...
Question 109: A security analyst is tasked with prioritizing vulnerabiliti...
Question 110: A SOC analyst determined that a significant number of the re...
Question 111: A security analyst discovers an ongoing ransomware attack wh...
Question 112: Which of the following would an organization use to develop ...
Question 113: A high volume of failed RDP authentication attempts was logg...
Question 114: A company's security team is updating a section of the repor...
Question 115: A penetration tester submitted data to a form in a web appli...
Question 116: Due to reports of unauthorized activity that was occurring o...
Question 117: The management team requests monthly KPI reports on the comp...
Question 118: Which of the following will most likely cause severe issues ...
Question 119: A security program was able to achieve a 30% improvement in ...
Question 120: An organization conducted a web application vulnerability as...
Question 121: Following a recent security incident, the Chief Information ...
Question 122: After conducting a cybersecurity risk assessment for a new s...
Question 123: A development team is preparing to roll out a beta version o...
Question 124: A company is deploying new vulnerability scanning software t...
Question 125: An organization recently changed its BC and DR plans. Which ...
Question 126: During an incident, an analyst needs to acquire evidence for...
Question 127: Following an incident, a security analyst needs to create a ...
Question 128: An organization has experienced a breach of customer transac...
Question 129: An analyst wants to ensure that users only leverage web-base...
Question 130: A systems administrator notices unfamiliar directory names o...
Question 131: During the log analysis phase, the following suspicious comm...
Question 132: An incident response team finished responding to a significa...
Question 133: Which of the following threat actors is most likely to targe...
Question 134: An attacker has just gained access to the syslog server on a...
Question 135: An analyst views the following log entries: (Exhibit) The or...
Question 136: A security analyst must preserve a system hard drive that wa...
Question 137: While reviewing web server logs, an analyst notices several ...
Question 138: Which of the following items should be included in a vulnera...
Question 139: A company recently removed administrator rights from all of ...
Question 140: Which of the following is a nation-state actor least likely ...
Question 141: A security analyst has found the following suspicious DNS tr...
Question 142: A vulnerability management team is unable to patch all vulne...
Question 143: Which of the following best describes the key goal of the co...
Question 144: A regulated organization experienced a security breach that ...
Question 145: A SIEM alert is triggered based on execution of a suspicious...
Question 146: A vulnerability analyst received a list of system vulnerabil...
Question 147: While reviewing the web server logs a security analyst notic...
Question 148: A security analyst is reviewing a packet capture in Wireshar...
Question 149: A security analyst is responding to an indent that involves ...
Question 150: During an incident involving phishing, a security analyst ne...