Which of the following BEST articulates the benefit of leveraging SCAP in an organization’s cybersecurity analysis toolset?
B
It is important to parameterize queries to prevent:
A
Which of the following secure coding techniques can be used to prevent cross-site request forgery attacks?
D
During a cyber incident, which of the following is the BEST course of action?
D
A security analyst wants to identify which vulnerabilities a potential attacker might initially exploit if the network is
compromised Which of the following would provide the BEST results?
D
An analyst is participating in the solution analysis process for a cloud-hosted SIEM platform to centralize log monitoring and
alerting capabilities in the SOC.
Which of the following is the BEST approach for supply chain assessment when selecting a vendor?
A
After a breach involving the exfiltration of a large amount of sensitive data a security analyst is reviewing the following
firewall logs to determine how the breach occurred:
Which of the following IP addresses does the analyst need to investigate further?
C
A security analyst is providing a risk assessment for a medical device that will be installed on the corporate network. During
the assessment, the analyst discovers the device has an embedded operating system that will be at the end of its life in two
years. Due to the criticality of the device, the security committee makes a risk- based policy decision to review and enforce
the vendor upgrade before the end of life is reached.
Which of the following risk actions has the security committee taken?
D
A cybersecurity analyst is dissecting an intrusion down to the specific techniques and wants to organize them in a logical
manner. Which of the following frameworks would BEST apply in this situation?
B
A contained section of a building is unable to connect to the Internet A security analyst. A security analyst investigates me
issue but does not see any connections to the corporate web proxy However the analyst does notice a small spike in traffic
to the Internet. The help desk technician verifies all users are connected to the connect SSID. but there are two of the same
SSIDs listed in the network connections. Which of the following BEST describes what is occurring?
A
A product manager is working with an analyst to design a new application that will perform as a data analytics platform and
will be accessible via a web browser. The product manager suggests using a PaaS provider to host the application.
Which of the following is a security concern when using a PaaS solution?
D
While analyzing network traffic, a security analyst discovers several computers on the network are connecting to a malicious
domain that was blocked by a DNS sinkhole. A new private IP range is now visible, but no change requests were made to
add it. Which of the following is the BEST solution for the security analyst to implement?
A
An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets.
Which of the following should be considered FIRST prior to disposing of the electronic data?
D
A security analyst receives an alert from the SIEM about a possible attack happening on the network The analyst opens the
alert and sees the IP address of the suspected server as 192.168.54.66. which is part of the network 192 168 54 0/24. The
analyst then pulls all the command history logs from that server and sees the following
Which of the following activities is MOST likely happening on the server?
A
A bad actor bypasses authentication and reveals all records in a database through an SQL injection.
Implementation of which of the following would work BEST to prevent similar attacks in
A