<< Prev Question Next Question >>

Question 166/175

Following a recent security incident, the Chief Information Security Officer is concerned with improving visibility and reporting of malicious actors in the environment. The goal is to reduce the time to prevent lateral movement and potential data exfiltration. Which of the following techniques will best achieve the improvement?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (175q)
Question 1: Which of the following is the appropriate phase in the incid...
Question 2: An analyst is conducting routine vulnerability assessments o...
Question 3: During a scan of a web server in the perimeter network, a vu...
Question 4: A company has decided to expose several systems to the inter...
Question 5: An analyst is imaging a hard drive that was obtained from th...
Question 6: A cryptocurrency service company is primarily concerned with...
Question 7: An XSS vulnerability was reported on one of the public websi...
Question 8: After an incident, a security analyst needs to perform a for...
Question 9: An end-of-life date was announced for a widely used OS. A bu...
Question 10: A penetration tester is conducting a test on an organization...
Question 11: A cybersecurity analyst is tasked with scanning a web applic...
Question 12: An organization has activated the CSIRT. A security analyst ...
Question 13: A zero-day command injection vulnerability was published. A ...
Question 14: Which of the following is a benefit of the Diamond Model of ...
Question 15: A security analyst needs to secure digital evidence related ...
Question 16: Which of the following ensures that a team receives simulate...
Question 17: A company has a primary control in place to restrict access ...
Question 18: A security analyst must assist the IT department with creati...
Question 19: An analyst reviews a recent government alert on new zero-day...
Question 20: A company is implementing a vulnerability management program...
Question 21: A company's internet-facing web application has been comprom...
Question 22: The Chief Executive Officer (CEO) has notified that a confid...
Question 23: An analyst is reviewing a vulnerability report for a server ...
Question 24: Which of the following concepts is using an API to insert bu...
Question 25: A security analyst is reviewing a recent vulnerability scan ...
Question 26: An employee received a phishing email that contained malware...
Question 27: A company's security team is updating a section of the repor...
Question 28: A vulnerability management team found four major vulnerabili...
Question 29: A security alert was triggered when an end user tried to acc...
Question 30: A security team identified several rogue Wi-Fi access points...
Question 31: During an incident, a security analyst discovers a large amo...
Question 32: Which of the following security operations tasks are ideal f...
Question 33: A vulnerability scan of a web server that is exposed to the ...
Question 34: The vulnerability analyst reviews threat intelligence regard...
Question 35: Which of the following best explains the importance of commu...
Question 36: The security operations team is required to consolidate seve...
Question 37: A security analyst is performing an investigation involving ...
Question 38: A company is concerned with finding sensitive file storage l...
Question 39: An incident response analyst notices multiple emails travers...
Question 40: Which of the following is the best metric for an organizatio...
Question 41: When undertaking a cloud migration of multiple SaaS applicat...
Question 42: An analyst investigated a website and produced the following...
Question 43: A company's user accounts have been compromised. Users are a...
Question 44: An organization has noticed large amounts of data are being ...
Question 45: After updating the email client to the latest patch, only ab...
Question 46: A security analyst is working on a server patch management p...
Question 47: Which of the following best describes the goal of a tabletop...
Question 48: A security program was able to achieve a 30% improvement in ...
Question 49: Which of the following will most likely cause severe issues ...
Question 50: An incident response team finished responding to a significa...
Question 51: When starting an investigation, which of the following must ...
Question 52: While performing a dynamic analysis of a malicious file, a s...
Question 53: Which of the following describes how a CSIRT lead determines...
Question 54: An analyst is suddenly unable to enrich data from the firewa...
Question 55: An organization utilizes multiple vendors, each with its own...
Question 56: A Chief Information Security Officer wants to map all the at...
Question 57: A recent penetration test discovered that several employees ...
Question 58: While reviewing web server logs, an analyst notices several ...
Question 59: When investigating a potentially compromised host, an analys...
Question 60: An analyst notices there is an internal device sending HTTPS...
Question 61: An email hosting provider added a new data center with new p...
Question 62: A security analyst reviews the following results of a Nikto ...
Question 63: A systems administrator receives reports of an internet-acce...
Question 64: A security administrator needs to import Pll data records fr...
Question 65: Patches for two highly exploited vulnerabilities were releas...
Question 66: Which of the following best explains the importance of netwo...
Question 67: A team of analysts is developing a new internal system that ...
Question 68: An incident response analyst is investigating the root cause...
Question 69: A company patches its servers using automation software. Rem...
Question 70: A security analyst reviews a packet capture and identifies t...
Question 71: A security analyst has prepared a vulnerability scan that co...
Question 72: A security analyst is validating a particular finding that w...
Question 73: A security analyst identifies a device on which different ma...
Question 74: While configuring a SIEM for an organization, a security ana...
Question 75: Which of the following should be updated after a lessons-lea...
Question 76: During a tabletop exercise, engineers discovered that an ICS...
Question 77: Which of the following would eliminate the need for differen...
Question 78: A security analyst reviews the latest vulnerability scans an...
Question 79: A SOC manager receives a phone call from an upset customer. ...
Question 80: A SOC receives several alerts indicating user accounts are c...
Question 81: The analyst reviews the following endpoint log entry: (Exhib...
Question 82: ID Source Destination Protocol Service 1 172.16.1.1 172.16.1...
Question 83: A security analyst is assisting a software engineer with the...
Question 84: A security analyst is tasked with prioritizing vulnerabiliti...
Question 85: A vulnerability scan shows several vulnerabilities. At the s...
Question 86: Following an attack, an analyst needs to provide a summary o...
Question 87: An organization was compromised, and the usernames and passw...
Question 88: A security analyst performs various types of vulnerability s...
Question 89: Which of the following is the best framework for assessing h...
Question 90: A security analyst found the following vulnerability on the ...
Question 91: While reviewing the web server logs a security analyst notic...
Question 92: A security analyst observed the following activity from a pr...
Question 93: A security team needs to demonstrate how prepared the team i...
Question 94: A security analyst identified the following suspicious entry...
Question 95: After completing a review of network activity. the threat hu...
Question 96: A security analyst needs to provide evidence of regular vuln...
Question 97: A SIEM alert is triggered based on execution of a suspicious...
Question 98: While reviewing the web server logs, a security analyst noti...
Question 99: Which of the following is often used to keep the number of a...
Question 100: A security analyst is performing an investigation involving ...
Question 101: A Chief Information Security Officer (CISO) wants to disable...
Question 102: A SOC team lead occasionally collects some DNS information f...
Question 103: An incident responder was able to recover a binary file thro...
Question 104: Which of the following responsibilities does the legal team ...
Question 105: A systems administrator is reviewing after-hours traffic flo...
Question 106: A systems administrator is reviewing after-hours traffic flo...
Question 107: Which of the following best describes the importance of impl...
Question 108: A company was able to reduce triage time by focusing on hist...
Question 109: While reviewing web server logs, a security analyst found th...
Question 110: A recent zero-day vulnerability is being actively exploited,...
Question 111: A security analyst recently used Arachni to perform a vulner...
Question 112: The security team at a company, which was a recent target of...
Question 113: Results of a SOC customer service evaluation indicate high l...
Question 114: A SOC analyst observes reconnaissance activity from an IP ad...
Question 115: A security analyst is trying to detect connections to a susp...
Question 116: Which of following would best mitigate the effects of a new ...
Question 117: The management team requests monthly KPI reports on the comp...
Question 118: A SOC analyst determined that a significant number of the re...
Question 119: The Chief Executive Officer of an organization recently hear...
Question 120: Which of the following is a reason why proper handling and r...
Question 121: An analyst is reviewing a vulnerability report and must make...
Question 122: A cloud team received an alert that unauthorized resources w...
Question 123: A disgruntled open-source developer has decided to sabotage ...
Question 124: An organization has tracked several incidents that are liste...
Question 125: Which of the following best describes the key goal of the co...
Question 126: A corporation wants to implement an agent-based endpoint sol...
Question 127: Each time a vulnerability assessment team shares the regular...
Question 128: A laptop that is company owned and managed is suspected to h...
Question 129: Which of the following is a circumstance in which a security...
Question 130: Based on an internal assessment, a vulnerability management ...
Question 131: Which of the following best describes the process of requiri...
Question 132: Which of the following is a KPI that is used to monitor or r...
Question 133: A Chief Information Security Officer has requested a dashboa...
Question 134: A cybersecurity team has witnessed numerous vulnerability ev...
Question 135: Which of the following is a nation-state actor least likely ...
Question 136: A security analyst is writing a shell script to identify IP ...
Question 137: A high volume of failed RDP authentication attempts was logg...
Question 138: An organization receives a legal hold request from an attorn...
Question 139: During a recent site survey. an analyst discovered a rogue w...
Question 140: A security analyst is reviewing the following alert that was...
Question 141: A security analyst detects an email server that had been com...
Question 142: During a security test, a security analyst found a critical ...
Question 143: A security analyst needs to prioritize vulnerabilities for p...
Question 144: A new cybersecurity analyst is tasked with creating an execu...
Question 145: An organization identifies a method to detect unexpected beh...
Question 146: A security analyst is improving an organization's vulnerabil...
Question 147: An analyst is reviewing a dashboard from the company's SIEM ...
Question 148: An older CVE with a vulnerability score of 7.1 was elevated ...
Question 149: During an incident, an analyst needs to acquire evidence for...
Question 150: The Chief Information Security Officer (CISO) of a large man...
Question 151: Which of the following attributes is part of the Diamond Mod...
Question 152: A company brings in a consultant to make improvements to its...
Question 153: Which of the following should be updated after a lessons-lea...
Question 154: A regulated organization experienced a security breach that ...
Question 155: Which of the following is the best action to take after the ...
Question 156: During the log analysis phase, the following suspicious comm...
Question 157: An employee is no longer able to log in to an account after ...
Question 158: Which of the following threat-modeling procedures is in the ...
Question 159: The SOC received a threat intelligence notification indicati...
Question 160: An analyst is designing a message system for a bank. The ana...
Question 161: An organization would like to ensure its cloud infrastructur...
Question 162: Which of the following tools would work best to prevent the ...
Question 163: An attacker recently gained unauthorized access to a financi...
Question 164: A SOC analyst recommends adding a layer of defense for all e...
Question 165: During an incident involving phishing, a security analyst ne...
Question 166: Following a recent security incident, the Chief Information ...
Question 167: Which of the following best explains the importance of utili...
Question 168: Which of the following best describes the reporting metric t...
Question 169: Which of the following is a commonly used four-component fra...
Question 170: After a security assessment was done by a third-party consul...
Question 171: Which of the following describes the best reason for conduct...
Question 172: A company recently removed administrator rights from all of ...
Question 173: An organization is planning to adopt a zero-trust architectu...
Question 174: A penetration tester submitted data to a form in a web appli...
Question 175: During an incident, some loCs of possible ransomware contami...