<< Prev Question Next Question >>

Question 151/178

An end-of-life date was announced for a widely used OS. A business-critical function is performed by some machinery that is controlled by a PC, which is utilizing the OS that is approaching the end-of- life date.
Which of the following best describes a security analyst's concern?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (178q)
Question 1: Which of the following is the best use of automation in cybe...
Question 2: Which of the following will most likely ensure that mission-...
Question 3: Which of the following is the most appropriate action a secu...
Question 4: An MSSP received several alerts from customer 1, which cause...
Question 5: A security analyst is working on a server patch management p...
Question 6: After updating the email client to the latest patch, only ab...
Question 7: Which of the following is a nation-state actor least likely ...
Question 8: During a scan of a web server in the perimeter network, a vu...
Question 9: A systems administrator notices unfamiliar directory names o...
Question 10: During security scanning, a security analyst regularly finds...
Question 11: A security program was able to achieve a 30% improvement in ...
Question 12: A systems analyst is limiting user access to system configur...
Question 13: When undertaking a cloud migration of multiple SaaS applicat...
Question 14: A cybersecurity analyst has been assigned to the threat-hunt...
Question 15: A security manager reviews the permissions for the approved ...
Question 16: A security analyst is writing a shell script to identify IP ...
Question 17: An analyst is reviewing a dashboard from the company's SIEM ...
Question 18: A regulated organization experienced a security breach that ...
Question 19: A new SOC manager reviewed findings regarding the strengths ...
Question 20: Patches for two highly exploited vulnerabilities were releas...
Question 21: Following an incident, a security analyst needs to create a ...
Question 22: A security analyst is improving an organization's vulnerabil...
Question 23: A security analyst must assist the IT department with creati...
Question 24: A Chief Information Security Officer (CISO) has determined t...
Question 25: An analyst is investigating a phishing incident and has retr...
Question 26: An analyst has received an IPS event notification from the S...
Question 27: Several critical bugs were identified during a vulnerability...
Question 28: A zero-day command injection vulnerability was published. A ...
Question 29: A security analyst is conducting a vulnerability assessment ...
Question 30: A security analyst is performing vulnerability scans on the ...
Question 31: Exploit code for a recently disclosed critical software vuln...
Question 32: An incident response team receives an alert to start an inve...
Question 33: Two employees in the finance department installed a freeware...
Question 34: A security analyst must preserve a system hard drive that wa...
Question 35: Which of the following is the best framework for assessing h...
Question 36: A vulnerability management team is unable to patch all vulne...
Question 37: An organization receives a legal hold request from an attorn...
Question 38: The SOC received a threat intelligence notification indicati...
Question 39: A security team needs to demonstrate how prepared the team i...
Question 40: A security analyst is reviewing events that occurred during ...
Question 41: Using open-source intelligence gathered from technical forum...
Question 42: Which of the following should be updated after a lessons-lea...
Question 43: A network security analyst for a large company noticed unusu...
Question 44: A company's security team is updating a section of the repor...
Question 45: A security analyst provides the management team with an afte...
Question 46: A new cybersecurity analyst is tasked with creating an execu...
Question 47: Which of the following is an important aspect that should be...
Question 48: Which of the following ensures that a team receives simulate...
Question 49: An analyst is designing a message system for a bank. The ana...
Question 50: An email hosting provider added a new data center with new p...
Question 51: A security analyst is responding to an indent that involves ...
Question 52: An employee downloads a freeware program to change the deskt...
Question 53: A payroll department employee was the target of a phishing a...
Question 54: Which of the following makes STIX and OpenloC information re...
Question 55: An analyst needs to provide recommendations based on a recen...
Question 56: A security analyst detects an exploit attempt containing the...
Question 57: The analyst reviews the following endpoint log entry: (Exhib...
Question 58: An organization utilizes multiple vendors, each with its own...
Question 59: A security analyst wants to implement new monitoring control...
Question 60: Which of the following explains the importance of a timeline...
Question 61: A security analyst needs to provide evidence of regular vuln...
Question 62: Each time a vulnerability assessment team shares the regular...
Question 63: A security team is concerned about recent Layer 4 DDoS attac...
Question 64: Which of the following tools would work best to prevent the ...
Question 65: A software developer has been deploying web applications wit...
Question 66: A technician identifies a vulnerability on a server and appl...
Question 67: The security analyst received the monthly vulnerability repo...
Question 68: An organization has tracked several incidents that are liste...
Question 69: A company receives a penetration test report summary from a ...
Question 70: Which of the following items should be included in a vulnera...
Question 71: A security analyst received a malicious binary file to analy...
Question 72: A company's internet-facing web application has been comprom...
Question 73: A list of loCs released by a government security organizatio...
Question 74: A security analyst is reviewing a packet capture in Wireshar...
Question 75: %77%77%77%2e%69%63%65%2d%70%74%69%63%2e%63%6f%6d Which of th...
Question 76: A security administrator has been notified by the IT operati...
Question 77: A security analyst has just received an incident ticket rega...
Question 78: A SOC analyst recommends adding a layer of defense for all e...
Question 79: An organization's email account was compromised by a bad act...
Question 80: A vulnerability scan shows the following issues: Asset Type ...
Question 81: An analyst reviews a recent government alert on new zero-day...
Question 82: While a security analyst for an organization was reviewing l...
Question 83: A virtual web server in a server pool was infected with malw...
Question 84: A cybersecurity analyst notices unusual network scanning act...
Question 85: Exploring Agent-Based Scans in Security Assessments...
Question 86: A security administrator needs to import Pll data records fr...
Question 87: The Chief Information Security Officer is directing a new pr...
Question 88: New employees in an organization have been consistently plug...
Question 89: Which of the following security operations tasks are ideal f...
Question 90: An organization has a critical financial application hosted ...
Question 91: A web application team notifies a SOC analyst that there are...
Question 92: A security analyst at a company called ACME Commercial notic...
Question 93: Joe, a leading sales person at an organization, has announce...
Question 94: Which of the following stakeholders are most likely to recei...
Question 95: The Chief Executive Officer of an organization recently hear...
Question 96: A Chief Information Security Officer wants to lock down the ...
Question 97: Which of the following does "federation" most likely refer t...
Question 98: During an incident, analysts need to rapidly investigate by ...
Question 99: Which of the following would an organization use to develop ...
Question 100: When undertaking a cloud migration of multiple SaaS applicat...
Question 101: A security analyst has found the following suspicious DNS tr...
Question 102: Which of the following is a useful tool for mapping, trackin...
Question 103: An incident response team found IoCs in a critical server. T...
Question 104: Which of the following best explains the importance of commu...
Question 105: Due to reports of unauthorized activity that was occurring o...
Question 106: A healthcare organization must develop an action plan based ...
Question 107: Which of the following is the best metric for an organizatio...
Question 108: Which of the following is a benefit of the Diamond Model of ...
Question 109: An analyst receives alerts that state the following traffic ...
Question 110: Which of the following is a KPI that is used to monitor or r...
Question 111: A SOC analyst observes reconnaissance activity from an IP ad...
Question 112: A SOC team lead occasionally collects some DNS information f...
Question 113: A security analyst is performing an investigation involving ...
Question 114: Which of the following best describes the goal of a tabletop...
Question 115: While reviewing web server logs, a security analyst discover...
Question 116: A small company does no! have enough staff to effectively se...
Question 117: Understanding Business Impact Analysis in Disaster Recovery ...
Question 118: An analyst wants to ensure that users only leverage web-base...
Question 119: Which of the following best describes the key goal of the co...
Question 120: A report contains IoC and TTP information for a zero-day exp...
Question 121: Which of the following attributes is part of the Diamond Mod...
Question 122: Which of the following risk management decisions should be c...
Question 123: A DevOps analyst implements a webhook to trigger code vulner...
Question 124: An analyst receives an alert for suspicious IIS log activity...
Question 125: A high volume of failed RDP authentication attempts was logg...
Question 126: A security analyst is trying to detect connections to a susp...
Question 127: After a security assessment was done by a third-party consul...
Question 128: A company is launching a new application in its internal net...
Question 129: A cloud team received an alert that unauthorized resources w...
Question 130: A security analyst found the following vulnerability on the ...
Question 131: Which of the following phases of the Cyber Kill Chain involv...
Question 132: An incident response team member is triaging a Linux server....
Question 133: A recent penetration test discovered that several employees ...
Question 134: An incident response team is assessing attack vectors of mal...
Question 135: When starting an investigation, which of the following must ...
Question 136: During a training exercise, a security analyst must determin...
Question 137: A security analyst needs to develop a solution to protect a ...
Question 138: A SOC analyst is analyzing traffic on a network and notices ...
Question 139: A SOC manager reviews metrics from the last four weeks to in...
Question 140: Which of the following best explains the importance of netwo...
Question 141: AXSS vulnerability was reported on one of the non-sensitive/...
Question 142: An organization conducted a web application vulnerability as...
Question 143: An analyst is reviewing a dashboard from the company's SIEM ...
Question 144: A systems administrator needs to gather security events with...
Question 145: Which of the following is a commonly used four-component fra...
Question 146: An analyst is evaluating a vulnerability management dashboar...
Question 147: A cybersecurity analyst is participating with the DLP projec...
Question 148: Which of the following statements best describes the MITRE A...
Question 149: During the log analysis phase, the following suspicious comm...
Question 150: Which of the following is the best reason to implement an MO...
Question 151: An end-of-life date was announced for a widely used OS. A bu...
Question 152: A security analyst reviews the latest vulnerability scans an...
Question 153: Which of the following entities should an incident manager w...
Question 154: The Chief Information Security Officer (CISO) of a large man...
Question 155: An organization has experienced a breach of customer transac...
Question 156: A cybersecurity analyst is doing triage in a SIEM and notice...
Question 157: Which of the following is the best authentication method to ...
Question 158: Which of the following best explains the importance of the i...
Question 159: Following a recent security incident, the Chief Information ...
Question 160: A security analyst needs to prioritize vulnerabilities for p...
Question 161: An organization needs to bring in data collection and aggreg...
Question 162: An organization discovered a data breach that resulted in Pl...
Question 163: A SOC receives several alerts indicating user accounts are c...
Question 164: An organization's threat intelligence team notes a recent tr...
Question 165: Which of the following best explains the importance of utili...
Question 166: Which of the following would help an analyst to quickly find...
Question 167: During a tabletop exercise, engineers discovered that an ICS...
Question 168: A security analyst identified the following suspicious entry...
Question 169: During an internal code review, software called "ACE" was di...
Question 170: Which of following would best mitigate the effects of a new ...
Question 171: An organization has activated the CSIRT. A security analyst ...
Question 172: A security analyst is reviewing the following alert that was...
Question 173: An analyst views the following log entries: (Exhibit) The or...
Question 174: An organization identifies a method to detect unexpected beh...
Question 175: A systems administrator is reviewing the output of a vulnera...
Question 176: A security analyst recently joined the team and is trying to...
Question 177: A web application has a function to retrieve content from an...
Question 178: A network analyst notices a long spike in traffic on port 14...