<< Prev Question Next Question >>

Question 19/178

A new SOC manager reviewed findings regarding the strengths and weaknesses of the last tabletop exercise in order to make improvements. Which of the following should the SOC manager utilize to improve the process?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (178q)
Question 1: Which of the following is the best use of automation in cybe...
Question 2: Which of the following will most likely ensure that mission-...
Question 3: Which of the following is the most appropriate action a secu...
Question 4: An MSSP received several alerts from customer 1, which cause...
Question 5: A security analyst is working on a server patch management p...
Question 6: After updating the email client to the latest patch, only ab...
Question 7: Which of the following is a nation-state actor least likely ...
Question 8: During a scan of a web server in the perimeter network, a vu...
Question 9: A systems administrator notices unfamiliar directory names o...
Question 10: During security scanning, a security analyst regularly finds...
Question 11: A security program was able to achieve a 30% improvement in ...
Question 12: A systems analyst is limiting user access to system configur...
Question 13: When undertaking a cloud migration of multiple SaaS applicat...
Question 14: A cybersecurity analyst has been assigned to the threat-hunt...
Question 15: A security manager reviews the permissions for the approved ...
Question 16: A security analyst is writing a shell script to identify IP ...
Question 17: An analyst is reviewing a dashboard from the company's SIEM ...
Question 18: A regulated organization experienced a security breach that ...
Question 19: A new SOC manager reviewed findings regarding the strengths ...
Question 20: Patches for two highly exploited vulnerabilities were releas...
Question 21: Following an incident, a security analyst needs to create a ...
Question 22: A security analyst is improving an organization's vulnerabil...
Question 23: A security analyst must assist the IT department with creati...
Question 24: A Chief Information Security Officer (CISO) has determined t...
Question 25: An analyst is investigating a phishing incident and has retr...
Question 26: An analyst has received an IPS event notification from the S...
Question 27: Several critical bugs were identified during a vulnerability...
Question 28: A zero-day command injection vulnerability was published. A ...
Question 29: A security analyst is conducting a vulnerability assessment ...
Question 30: A security analyst is performing vulnerability scans on the ...
Question 31: Exploit code for a recently disclosed critical software vuln...
Question 32: An incident response team receives an alert to start an inve...
Question 33: Two employees in the finance department installed a freeware...
Question 34: A security analyst must preserve a system hard drive that wa...
Question 35: Which of the following is the best framework for assessing h...
Question 36: A vulnerability management team is unable to patch all vulne...
Question 37: An organization receives a legal hold request from an attorn...
Question 38: The SOC received a threat intelligence notification indicati...
Question 39: A security team needs to demonstrate how prepared the team i...
Question 40: A security analyst is reviewing events that occurred during ...
Question 41: Using open-source intelligence gathered from technical forum...
Question 42: Which of the following should be updated after a lessons-lea...
Question 43: A network security analyst for a large company noticed unusu...
Question 44: A company's security team is updating a section of the repor...
Question 45: A security analyst provides the management team with an afte...
Question 46: A new cybersecurity analyst is tasked with creating an execu...
Question 47: Which of the following is an important aspect that should be...
Question 48: Which of the following ensures that a team receives simulate...
Question 49: An analyst is designing a message system for a bank. The ana...
Question 50: An email hosting provider added a new data center with new p...
Question 51: A security analyst is responding to an indent that involves ...
Question 52: An employee downloads a freeware program to change the deskt...
Question 53: A payroll department employee was the target of a phishing a...
Question 54: Which of the following makes STIX and OpenloC information re...
Question 55: An analyst needs to provide recommendations based on a recen...
Question 56: A security analyst detects an exploit attempt containing the...
Question 57: The analyst reviews the following endpoint log entry: (Exhib...
Question 58: An organization utilizes multiple vendors, each with its own...
Question 59: A security analyst wants to implement new monitoring control...
Question 60: Which of the following explains the importance of a timeline...
Question 61: A security analyst needs to provide evidence of regular vuln...
Question 62: Each time a vulnerability assessment team shares the regular...
Question 63: A security team is concerned about recent Layer 4 DDoS attac...
Question 64: Which of the following tools would work best to prevent the ...
Question 65: A software developer has been deploying web applications wit...
Question 66: A technician identifies a vulnerability on a server and appl...
Question 67: The security analyst received the monthly vulnerability repo...
Question 68: An organization has tracked several incidents that are liste...
Question 69: A company receives a penetration test report summary from a ...
Question 70: Which of the following items should be included in a vulnera...
Question 71: A security analyst received a malicious binary file to analy...
Question 72: A company's internet-facing web application has been comprom...
Question 73: A list of loCs released by a government security organizatio...
Question 74: A security analyst is reviewing a packet capture in Wireshar...
Question 75: %77%77%77%2e%69%63%65%2d%70%74%69%63%2e%63%6f%6d Which of th...
Question 76: A security administrator has been notified by the IT operati...
Question 77: A security analyst has just received an incident ticket rega...
Question 78: A SOC analyst recommends adding a layer of defense for all e...
Question 79: An organization's email account was compromised by a bad act...
Question 80: A vulnerability scan shows the following issues: Asset Type ...
Question 81: An analyst reviews a recent government alert on new zero-day...
Question 82: While a security analyst for an organization was reviewing l...
Question 83: A virtual web server in a server pool was infected with malw...
Question 84: A cybersecurity analyst notices unusual network scanning act...
Question 85: Exploring Agent-Based Scans in Security Assessments...
Question 86: A security administrator needs to import Pll data records fr...
Question 87: The Chief Information Security Officer is directing a new pr...
Question 88: New employees in an organization have been consistently plug...
Question 89: Which of the following security operations tasks are ideal f...
Question 90: An organization has a critical financial application hosted ...
Question 91: A web application team notifies a SOC analyst that there are...
Question 92: A security analyst at a company called ACME Commercial notic...
Question 93: Joe, a leading sales person at an organization, has announce...
Question 94: Which of the following stakeholders are most likely to recei...
Question 95: The Chief Executive Officer of an organization recently hear...
Question 96: A Chief Information Security Officer wants to lock down the ...
Question 97: Which of the following does "federation" most likely refer t...
Question 98: During an incident, analysts need to rapidly investigate by ...
Question 99: Which of the following would an organization use to develop ...
Question 100: When undertaking a cloud migration of multiple SaaS applicat...
Question 101: A security analyst has found the following suspicious DNS tr...
Question 102: Which of the following is a useful tool for mapping, trackin...
Question 103: An incident response team found IoCs in a critical server. T...
Question 104: Which of the following best explains the importance of commu...
Question 105: Due to reports of unauthorized activity that was occurring o...
Question 106: A healthcare organization must develop an action plan based ...
Question 107: Which of the following is the best metric for an organizatio...
Question 108: Which of the following is a benefit of the Diamond Model of ...
Question 109: An analyst receives alerts that state the following traffic ...
Question 110: Which of the following is a KPI that is used to monitor or r...
Question 111: A SOC analyst observes reconnaissance activity from an IP ad...
Question 112: A SOC team lead occasionally collects some DNS information f...
Question 113: A security analyst is performing an investigation involving ...
Question 114: Which of the following best describes the goal of a tabletop...
Question 115: While reviewing web server logs, a security analyst discover...
Question 116: A small company does no! have enough staff to effectively se...
Question 117: Understanding Business Impact Analysis in Disaster Recovery ...
Question 118: An analyst wants to ensure that users only leverage web-base...
Question 119: Which of the following best describes the key goal of the co...
Question 120: A report contains IoC and TTP information for a zero-day exp...
Question 121: Which of the following attributes is part of the Diamond Mod...
Question 122: Which of the following risk management decisions should be c...
Question 123: A DevOps analyst implements a webhook to trigger code vulner...
Question 124: An analyst receives an alert for suspicious IIS log activity...
Question 125: A high volume of failed RDP authentication attempts was logg...
Question 126: A security analyst is trying to detect connections to a susp...
Question 127: After a security assessment was done by a third-party consul...
Question 128: A company is launching a new application in its internal net...
Question 129: A cloud team received an alert that unauthorized resources w...
Question 130: A security analyst found the following vulnerability on the ...
Question 131: Which of the following phases of the Cyber Kill Chain involv...
Question 132: An incident response team member is triaging a Linux server....
Question 133: A recent penetration test discovered that several employees ...
Question 134: An incident response team is assessing attack vectors of mal...
Question 135: When starting an investigation, which of the following must ...
Question 136: During a training exercise, a security analyst must determin...
Question 137: A security analyst needs to develop a solution to protect a ...
Question 138: A SOC analyst is analyzing traffic on a network and notices ...
Question 139: A SOC manager reviews metrics from the last four weeks to in...
Question 140: Which of the following best explains the importance of netwo...
Question 141: AXSS vulnerability was reported on one of the non-sensitive/...
Question 142: An organization conducted a web application vulnerability as...
Question 143: An analyst is reviewing a dashboard from the company's SIEM ...
Question 144: A systems administrator needs to gather security events with...
Question 145: Which of the following is a commonly used four-component fra...
Question 146: An analyst is evaluating a vulnerability management dashboar...
Question 147: A cybersecurity analyst is participating with the DLP projec...
Question 148: Which of the following statements best describes the MITRE A...
Question 149: During the log analysis phase, the following suspicious comm...
Question 150: Which of the following is the best reason to implement an MO...
Question 151: An end-of-life date was announced for a widely used OS. A bu...
Question 152: A security analyst reviews the latest vulnerability scans an...
Question 153: Which of the following entities should an incident manager w...
Question 154: The Chief Information Security Officer (CISO) of a large man...
Question 155: An organization has experienced a breach of customer transac...
Question 156: A cybersecurity analyst is doing triage in a SIEM and notice...
Question 157: Which of the following is the best authentication method to ...
Question 158: Which of the following best explains the importance of the i...
Question 159: Following a recent security incident, the Chief Information ...
Question 160: A security analyst needs to prioritize vulnerabilities for p...
Question 161: An organization needs to bring in data collection and aggreg...
Question 162: An organization discovered a data breach that resulted in Pl...
Question 163: A SOC receives several alerts indicating user accounts are c...
Question 164: An organization's threat intelligence team notes a recent tr...
Question 165: Which of the following best explains the importance of utili...
Question 166: Which of the following would help an analyst to quickly find...
Question 167: During a tabletop exercise, engineers discovered that an ICS...
Question 168: A security analyst identified the following suspicious entry...
Question 169: During an internal code review, software called "ACE" was di...
Question 170: Which of following would best mitigate the effects of a new ...
Question 171: An organization has activated the CSIRT. A security analyst ...
Question 172: A security analyst is reviewing the following alert that was...
Question 173: An analyst views the following log entries: (Exhibit) The or...
Question 174: An organization identifies a method to detect unexpected beh...
Question 175: A systems administrator is reviewing the output of a vulnera...
Question 176: A security analyst recently joined the team and is trying to...
Question 177: A web application has a function to retrieve content from an...
Question 178: A network analyst notices a long spike in traffic on port 14...