<< Prev Question Next Question >>

Question 3/179

A new SOC manager reviewed findings regarding the strengths and weaknesses of the last tabletop exercise in order to make improvements. Which of the following should the SOC manager utilize to improve the process?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (179q)
Question 1: A security analyst reviews the following results of a Nikto ...
Question 2: An analyst is investigating a phishing incident and has retr...
Question 3: A new SOC manager reviewed findings regarding the strengths ...
Question 4: An incident response analyst is investigating the root cause...
Question 5: A security analyst at a company called ACME Commercial notic...
Question 6: An analyst is becoming overwhelmed with the number of events...
Question 7: An organization conducted a web application vulnerability as...
Question 8: Which of the following is a reason why proper handling and r...
Question 9: A SOC analyst recommends adding a layer of defense for all e...
Question 10: Which of the following phases of the Cyber Kill Chain involv...
Question 11: An older CVE with a vulnerability score of 7.1 was elevated ...
Question 12: An analyst investigated a website and produced the following...
Question 13: An analyst is designing a message system for a bank. The ana...
Question 14: A development team is preparing to roll out a beta version o...
Question 15: A security analyst is reviewing the logs of a web server and...
Question 16: A SIEM alert is triggered based on execution of a suspicious...
Question 17: When undertaking a cloud migration of multiple SaaS applicat...
Question 18: A network analyst notices a long spike in traffic on port 14...
Question 19: When starting an investigation, which of the following must ...
Question 20: A cybersecurity team has witnessed numerous vulnerability ev...
Question 21: An incident response analyst notices multiple emails travers...
Question 22: Which of the following responsibilities does the legal team ...
Question 23: Which of the following is described as a method of enforcing...
Question 24: A company is launching a new application in its internal net...
Question 25: A security analyst runs the following command: # nmap -T4 -F...
Question 26: While performing a dynamic analysis of a malicious file, a s...
Question 27: After updating the email client to the latest patch, only ab...
Question 28: An organization enabled a SIEM rule to send an alert to a se...
Question 29: During an incident, a security analyst discovers a large amo...
Question 30: Which of the following are process improvements that can be ...
Question 31: A security analyst is trying to validate the results of a we...
Question 32: A security analyst needs to ensure that systems across the o...
Question 33: An organization has established a formal change management p...
Question 34: Which of the following threat-modeling procedures is in the ...
Question 35: An email hosting provider added a new data center with new p...
Question 36: A security analyst is responding to an indent that involves ...
Question 37: A virtual web server in a server pool was infected with malw...
Question 38: An analyst is reviewing a dashboard from the company's SIEM ...
Question 39: A manufacturer has hired a third-party consultant to assess ...
Question 40: An analyst needs to provide recommendations based on a recen...
Question 41: A Chief Information Security Officer wants to lock down the ...
Question 42: A company is deploying new vulnerability scanning software t...
Question 43: A web application team notifies a SOC analyst that there are...
Question 44: A cybersecurity team lead is developing metrics to present i...
Question 45: A security analyst is performing an investigation involving ...
Question 46: An analyst recommends that an EDR agent collect the source I...
Question 47: Which of the following is the best reason to implement an MO...
Question 48: A security administrator needs to import Pll data records fr...
Question 49: Which of the following makes STIX and OpenloC information re...
Question 50: A Chief Information Security Officer wants to implement secu...
Question 51: An analyst has received an IPS event notification from the S...
Question 52: The Chief Executive Officer (CEO) has notified that a confid...
Question 53: A report contains IoC and TTP information for a zero-day exp...
Question 54: A security analyst is writing a shell script to identify IP ...
Question 55: A company is in the process of implementing a vulnerability ...
Question 56: A security analyst has identified a new malware file that ha...
Question 57: An employee received a phishing email that contained malware...
Question 58: A security analyst is trying to identify possible network ad...
Question 59: A team of analysts is developing a new internal system that ...
Question 60: A threat hunter seeks to identify new persistence mechanisms...
Question 61: A security administrator has been notified by the IT operati...
Question 62: An end-of-life date was announced for a widely used OS. A bu...
Question 63: An incident response team found IoCs in a critical server. T...
Question 64: A security analyst is validating a particular finding that w...
Question 65: A security analyst is reviewing a packet capture in Wireshar...
Question 66: An employee is no longer able to log in to an account after ...
Question 67: An incident response team is working with law enforcement to...
Question 68: A systems administrator notices unfamiliar directory names o...
Question 69: Which of the following security operations tasks are ideal f...
Question 70: A security analyst found the following vulnerability on the ...
Question 71: A company recently removed administrator rights from all of ...
Question 72: An analyst notices there is an internal device sending HTTPS...
Question 73: Following a recent security incident, the Chief Information ...
Question 74: New employees in an organization have been consistently plug...
Question 75: The security team reviews a web server for XSS and runs the ...
Question 76: A security analyst receives an alert for suspicious activity...
Question 77: Which of the following is a nation-state actor least likely ...
Question 78: Which of the following actions would an analyst most likely ...
Question 79: During an extended holiday break, a company suffered a secur...
Question 80: An organization's email account was compromised by a bad act...
Question 81: A SOC receives several alerts indicating user accounts are c...
Question 82: Which of the following responsibilities does the legal team ...
Question 83: An analyst is evaluating the following vulnerability report:...
Question 84: An attacker recently gained unauthorized access to a financi...
Question 85: Several reports with sensitive information are being disclos...
Question 86: A security analyst performs a vulnerability scan. Based on t...
Question 87: Patches for two highly exploited vulnerabilities were releas...
Question 88: A security administrator has found indications of dictionary...
Question 89: Which of the following is often used to keep the number of a...
Question 90: A vulnerability management team is unable to patch all vulne...
Question 91: An analyst is reviewing a vulnerability report and must make...
Question 92: Given the following CVSS string- CVSS:3.0/AV:N/AC:L/PR:N/UI:...
Question 93: An organization discovered a data breach that resulted in Pl...
Question 94: After completing a review of network activity. the threat hu...
Question 95: While reviewing web server logs, a security analyst found th...
Question 96: The vulnerability analyst reviews threat intelligence regard...
Question 97: An analyst is conducting routine vulnerability assessments o...
Question 98: During the log analysis phase, the following suspicious comm...
Question 99: A new cybersecurity analyst is tasked with creating an execu...
Question 100: A security manager is looking at a third-party vulnerability...
Question 101: During a scan of a web server in the perimeter network, a vu...
Question 102: A SOC analyst determined that a significant number of the re...
Question 103: An organization's threat intelligence team notes a recent tr...
Question 104: A SOC analyst observes reconnaissance activity from an IP ad...
Question 105: A vulnerability scan of a web server that is exposed to the ...
Question 106: A security analyst must preserve a system hard drive that wa...
Question 107: A security analyst would like to integrate two different Saa...
Question 108: A user downloads software that contains malware onto a compu...
Question 109: A SOC analyst observes reconnaissance activity from an IP ad...
Question 110: A security analyst has found a moderate-risk item in an orga...
Question 111: A security analyst recently used Arachni to perform a vulner...
Question 112: SIMULATION Approximately 100 employees at your company have ...
Question 113: Which of the following is most appropriate to use with SOAR ...
Question 114: A systems administrator receives reports of an internet-acce...
Question 115: In the last hour, a high volume of failed RDP authentication...
Question 116: A systems administrator needs to gather security events with...
Question 117: A company recently experienced a security incident. The secu...
Question 118: A security program was able to achieve a 30% improvement in ...
Question 119: Which of the following is the best metric for an organizatio...
Question 120: Which of the following is the best way to begin preparation ...
Question 121: A SOC manager receives a phone call from an upset customer. ...
Question 122: A payroll department employee was the target of a phishing a...
Question 123: A SOC team lead occasionally collects some DNS information f...
Question 124: A malicious actor has gained access to an internal network b...
Question 125: An organization is conducting a pilot deployment of an e-com...
Question 126: A company has the following security requirements: . No publ...
Question 127: An analyst is conducting monitoring against an authorized te...
Question 128: A security analyst discovers an ongoing ransomware attack wh...
Question 129: Which of the following items should be included in a vulnera...
Question 130: Which of the following characteristics ensures the security ...
Question 131: Which of the following best describes the threat concept in ...
Question 132: During a cybersecurity incident, one of the web servers at t...
Question 133: The Chief Information Security Officer (CISO) of a large man...
Question 134: A penetration tester submitted data to a form in a web appli...
Question 135: A list of loCs released by a government security organizatio...
Question 136: An analyst is suddenly unable to enrich data from the firewa...
Question 137: An analyst views the following log entries: (Exhibit) The or...
Question 138: During security scanning, a security analyst regularly finds...
Question 139: Which of the following entities should an incident manager w...
Question 140: Which of the following is the most appropriate action a secu...
Question 141: An analyst finds that an IP address outside of the company n...
Question 142: Which of the following most accurately describes the Cyber K...
Question 143: A security analyst reviews the following extract of a vulner...
Question 144: A cybersecurity analyst is doing triage in a SIEM and notice...
Question 145: An organization has experienced a breach of customer transac...
Question 146: The management team requests monthly KPI reports on the comp...
Question 147: An organization would like to ensure its cloud infrastructur...
Question 148: A company has decided to expose several systems to the inter...
Question 149: After conducting a cybersecurity risk assessment for a new s...
Question 150: A security analyst needs to secure digital evidence related ...
Question 151: Security analysts review logs on multiple servers on a daily...
Question 152: Which of the following concepts is using an API to insert bu...
Question 153: A security analyst is working on a server patch management p...
Question 154: Which of the following explains the importance of a timeline...
Question 155: A software developer has been deploying web applications wit...
Question 156: A technician is analyzing output from a popular network mapp...
Question 157: A security analyst is performing an investigation involving ...
Question 158: A security team is concerned about recent Layer 4 DDoS attac...
Question 159: The Chief Information Security Officer (CISO) of a large man...
Question 160: Executives at an organization email sensitive financial info...
Question 161: A security analyst detects an exploit attempt containing the...
Question 162: A Chief Information Security Officer (CISO) is concerned tha...
Question 163: A cybersecurity analyst is reviewing SIEM logs and observes ...
Question 164: An analyst discovers unusual outbound connections to an IP t...
Question 165: A security analyst reviews the latest vulnerability scans an...
Question 166: A company's internet-facing web application has been comprom...
Question 167: A high volume of failed RDP authentication attempts was logg...
Question 168: Which of the following is a useful tool for mapping, trackin...
Question 169: Which of the following would help to minimize human engageme...
Question 170: Which Of the following techniques would be best to provide t...
Question 171: A security analyst is trying to detect connections to a susp...
Question 172: A cybersecurity analyst is tasked with scanning a web applic...
Question 173: Which of the following best describes the document that defi...
Question 174: Which of the following best describes the goal of a tabletop...
Question 175: Which of the following risk management principles is accompl...
Question 176: An employee is suspected of misusing a company-issued laptop...
Question 177: A security analyst scans a host and generates the following ...
Question 178: The Chief Information Security Officer is directing a new pr...
Question 179: An incident response team finished responding to a significa...