<< Prev Question Next Question >>

Question 11/176

A security analyst needs to ensure that systems across the organization are protected based on the sensitivity of the content each system hosts. The analyst is working with the respective system owners to help determine the best methodology that seeks to promote confidentiality, availability, and integrity of the data being hosted. Which of the following should the security analyst perform first to categorize and prioritize the respective systems?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (176q)
Question 1: Which of the following is the most appropriate action a secu...
Question 2: A company's security team is updating a section of the repor...
Question 3: A company is in the process of implementing a vulnerability ...
Question 4: An analyst wants to ensure that users only leverage web-base...
Question 5: An attacker has just gained access to the syslog server on a...
Question 6: While reviewing web server logs, an analyst notices several ...
Question 7: A company patches its servers using automation software. Rem...
Question 8: A systems administrator receives reports of an internet-acce...
Question 9: A security analyst discovers an ongoing ransomware attack wh...
Question 10: The SOC received a threat intelligence notification indicati...
Question 11: A security analyst needs to ensure that systems across the o...
Question 12: An analyst finds that an IP address outside of the company n...
Question 13: Following a recent security incident, the Chief Information ...
Question 14: A SIEM alert is triggered based on execution of a suspicious...
Question 15: A threat hunter seeks to identify new persistence mechanisms...
Question 16: An organization enabled a SIEM rule to send an alert to a se...
Question 17: An older CVE with a vulnerability score of 7.1 was elevated ...
Question 18: Which of the following best describes the document that defi...
Question 19: Which of the following most accurately describes the Cyber K...
Question 20: A security analyst has received an incident case regarding m...
Question 21: Patches for two highly exploited vulnerabilities were releas...
Question 22: An analyst is conducting routine vulnerability assessments o...
Question 23: An end-of-life date was announced for a widely used OS. A bu...
Question 24: Which of the following are process improvements that can be ...
Question 25: A laptop that is company owned and managed is suspected to h...
Question 26: A security analyst is validating a particular finding that w...
Question 27: An analyst is becoming overwhelmed with the number of events...
Question 28: An analyst investigated a website and produced the following...
Question 29: A security analyst reviews a packet capture and identifies t...
Question 30: An incident response team is working with law enforcement to...
Question 31: A SOC team lead occasionally collects some DNS information f...
Question 32: Which of the following best describes the threat concept in ...
Question 33: A security analyst is trying to identify anomalies on the ne...
Question 34: Which of the following best describes the importance of impl...
Question 35: A cybersecurity analyst has been assigned to the threat-hunt...
Question 36: An organization is conducting a pilot deployment of an e-com...
Question 37: Security analysts review logs on multiple servers on a daily...
Question 38: A security analyst needs to provide evidence of regular vuln...
Question 39: A security analyst is responding to an indent that involves ...
Question 40: The analyst reviews the following endpoint log entry: (Exhib...
Question 41: A security analyst scans a host and generates the following ...
Question 42: An analyst recommends that an EDR agent collect the source I...
Question 43: Which of the following tools would work best to prevent the ...
Question 44: A security analyst is reviewing the logs of a web server and...
Question 45: K company has recently experienced a security breach via a p...
Question 46: Which of the following in the digital forensics process is c...
Question 47: A SOC analyst is analyzing traffic on a network and notices ...
Question 48: A security analyst has found a moderate-risk item in an orga...
Question 49: A Chief Information Security Officer (CISO) wants to disable...
Question 50: An analyst is designing a message system for a bank. The ana...
Question 51: After completing a review of network activity. the threat hu...
Question 52: Which of the following best explains the importance of commu...
Question 53: Which of the following phases of the Cyber Kill Chain involv...
Question 54: An employee received a phishing email that contained malware...
Question 55: Which of the following is the best action to take after the ...
Question 56: When undertaking a cloud migration of multiple SaaS applicat...
Question 57: A recent zero-day vulnerability is being actively exploited,...
Question 58: A cybersecurity analyst is recording the following details *...
Question 59: An organization has established a formal change management p...
Question 60: After an upgrade to a new EDR, a security analyst received r...
Question 61: A systems administrator notices unfamiliar directory names o...
Question 62: A disgruntled open-source developer has decided to sabotage ...
Question 63: Which of the following is often used to keep the number of a...
Question 64: An incident response analyst is investigating the root cause...
Question 65: An organization needs to bring in data collection and aggreg...
Question 66: The Chief Information Security Officer (CISO) of a large man...
Question 67: A vulnerability scan of a web server that is exposed to the ...
Question 68: During a scan of a web server in the perimeter network, a vu...
Question 69: An employee downloads a freeware program to change the deskt...
Question 70: An employee is suspected of misusing a company-issued laptop...
Question 71: After updating the email client to the latest patch, only ab...
Question 72: Which of the following is described as a method of enforcing...
Question 73: An organization has activated the CSIRT. A security analyst ...
Question 74: Exploit code for a recently disclosed critical software vuln...
Question 75: A security analyst would like to integrate two different Saa...
Question 76: A systems administrator is reviewing after-hours traffic flo...
Question 77: A security analyst is trying to validate the results of a we...
Question 78: An analyst is reviewing a dashboard from the company's SIEM ...
Question 79: During an internal code review, software called "ACE" was di...
Question 80: A SOC manager receives a phone call from an upset customer. ...
Question 81: A security analyst has prepared a vulnerability scan that co...
Question 82: A Chief Information Security Officer wants to map all the at...
Question 83: A security analyst reviews a SIEM alert related to a suspici...
Question 84: A recent penetration test discovered that several employees ...
Question 85: A security analyst received a malicious binary file to analy...
Question 86: An employee is no longer able to log in to an account after ...
Question 87: An organization has experienced a breach of customer transac...
Question 88: A security analyst needs to mitigate a known, exploited vuln...
Question 89: An analyst is evaluating the following vulnerability report:...
Question 90: Several vulnerability scan reports have indicated runtime er...
Question 91: A penetration tester is conducting a test on an organization...
Question 92: Two employees in the finance department installed a freeware...
Question 93: A security analyst is trying to detect connections to a susp...
Question 94: During an incident involving phishing, a security analyst ne...
Question 95: A security administrator has found indications of dictionary...
Question 96: A security analyst received an alert regarding multiple succ...
Question 97: A security administrator has found indications of dictionary...
Question 98: A report contains IoC and TTP information for a zero-day exp...
Question 99: An XSS vulnerability was reported on one of the public websi...
Question 100: A security alert was triggered when an end user tried to acc...
Question 101: A security team conducts a lessons-learned meeting after str...
Question 102: An organization identifies a method to detect unexpected beh...
Question 103: Which of the following will most likely ensure that mission-...
Question 104: A network security analyst for a large company noticed unusu...
Question 105: The management team requests monthly KPI reports on the comp...
Question 106: A vulnerability scan shows several vulnerabilities. At the s...
Question 107: A security analyst must preserve a system hard drive that wa...
Question 108: A security analyst performs various types of vulnerability s...
Question 109: Which of the following describes a contract that is used to ...
Question 110: A payroll department employee was the target of a phishing a...
Question 111: The Chief Information Security Officer wants the same level ...
Question 112: The security operations team is required to consolidate seve...
Question 113: Which of the following is a benefit of the Diamond Model of ...
Question 114: Which of the following is the most important factor to ensur...
Question 115: During normal security monitoring activities, the following ...
Question 116: A security analyst is tasked with prioritizing vulnerabiliti...
Question 117: During an incident, an analyst needs to acquire evidence for...
Question 118: Which of the following threat-modeling procedures is in the ...
Question 119: An incident response analyst is taking over an investigation...
Question 120: A Chief Information Security Officer wants to implement secu...
Question 121: A Chief Information Security Officer (CISO) has determined t...
Question 122: An MSSP received several alerts from customer 1, which cause...
Question 123: An analyst is suddenly unable to enrich data from the firewa...
Question 124: An organization conducted a web application vulnerability as...
Question 125: Which of the following is a KPI that is used to monitor or r...
Question 126: Which of the following best explains the importance of netwo...
Question 127: Following an incident, a security analyst needs to create a ...
Question 128: An analyst reviews the following web server log entries: %2E...
Question 129: Which of the following items should be included in a vulnera...
Question 130: An analyst notices there is an internal device sending HTTPS...
Question 131: A security analyst at a company called ACME Commercial notic...
Question 132: Which of the following risk management principles is accompl...
Question 133: A cryptocurrency service company is primarily concerned with...
Question 134: Which of the following would an organization use to develop ...
Question 135: An incident response team finished responding to a significa...
Question 136: A security analyst observed the following activity from a pr...
Question 137: An organization's email account was compromised by a bad act...
Question 138: Results of a SOC customer service evaluation indicate high l...
Question 139: A security analyst detects an email server that had been com...
Question 140: A security analyst receives an alert for suspicious activity...
Question 141: The Chief Information Security Officer for an organization r...
Question 142: After conducting a cybersecurity risk assessment for a new s...
Question 143: A company recently removed administrator rights from all of ...
Question 144: A Chief Information Security Officer has outlined several re...
Question 145: Which of the following best describes the key elements of a ...
Question 146: A company's user accounts have been compromised. Users are a...
Question 147: Due to an incident involving company devices, an incident re...
Question 148: A security analyst is reviewing the following alert that was...
Question 149: A cybersecurity analyst has recovered a recently compromised...
Question 150: A SOC receives several alerts indicating user accounts are c...
Question 151: While configuring a SIEM for an organization, a security ana...
Question 152: An analyst has been asked to validate the potential risk of ...
Question 153: A security audit for unsecured network services was conducte...
Question 154: A security analyst has identified a new malware file that ha...
Question 155: A network analyst notices a long spike in traffic on port 14...
Question 156: Which of the following best explains the importance of the i...
Question 157: A security program was able to achieve a 30% improvement in ...
Question 158: A development team is preparing to roll out a beta version o...
Question 159: A systems administrator needs to gather security events with...
Question 160: New employees in an organization have been consistently plug...
Question 161: A security analyst needs to develop a solution to protect a ...
Question 162: During an extended holiday break, a company suffered a secur...
Question 163: A high volume of failed RDP authentication attempts was logg...
Question 164: During a recent site survey. an analyst discovered a rogue w...
Question 165: A vulnerability management team is unable to patch all vulne...
Question 166: Which of the following should be updated after a lessons-lea...
Question 167: A list of loCs released by a government security organizatio...
Question 168: A security analyst detects an exploit attempt containing the...
Question 169: Which of the following is an important aspect that should be...
Question 170: During security scanning, a security analyst regularly finds...
Question 171: A security analyst is reviewing the findings of the latest v...
Question 172: A team of analysts is developing a new internal system that ...
Question 173: Several critical bugs were identified during a vulnerability...
Question 174: A systems administrator receives reports of an internet-acce...
Question 175: An employee accessed a website that caused a device to becom...
Question 176: A regulated organization experienced a security breach that ...