A company in the financial sector receives a substantial number of customer transaction
requests via email. While doing a root-cause analysis conceding a security breach, the
CIRT correlates an unusual spike in port 80 traffic from the IP address of a desktop used
by a customer relations employee who has access to several of the compromised
accounts. Subsequent antivirus scans of the device do not return an findings, but the CIRT
finds undocumented services running on the device. Which of the following controls would reduce the discovery time for similar in the future.
A.
Implementing application blacklisting
B.
Configuring the mall to quarantine incoming attachment automatically
C.
Deploying host-based firewalls and shipping the logs to the SIEM
D.
Increasing the cadence for antivirus DAT updates to twice daily
Deploying host-based firewalls and shipping the logs to the SIEM
A cybersecurity analyst created the following tables to help determine the maximum budget amount the business can justify spending on an improved email filtering system:
Which of the following meets the budget needs of the business?
A.
Filter ABC
B.
Filter XYZ
C.
Filter GHI
D.
Filter TUV
Filter GHI
A security analyst is reviewing network connectivity on a Linux workstation and examining the active TCP connections using the command line.Which of the following commands would be the BEST to run to view only active Internet
connections?
A.
sudo netstat -antu | grep “LISTEN” | awk ‘{print$5}’
B.
sudo netstat -nlt -p | grep “ESTABLISHED”
C.
sudo netstat -plntu | grep -v “Foreign Address”
D.
sudo netstat -pnut -w | column -t -s $’\w’
E.
sudo netstat -pnut | grep -P ^tcp
sudo netstat -nlt -p | grep “ESTABLISHED”
Reference: https://www.codegrepper.com/code-examples/shell/netstat+find+port
A security analyst is reviewing the following output:
Which of the following would BEST mitigate this type of attack?
A.
Installing a network firewall
B.
Placing a WAF inline
C.
Implementing an IDS
D.
Deploying a honeypot
Installing a network firewall
An organization recently started processing, transmitting, and storing its customers’ credit
card information. Within a week of doing so, the organization suffered a massive breach
that resulted in the exposure of the customers’ information.
Which of the following provides the BEST guidance for protecting such information while it is at rest and in transit?
A.
NIST
B.
GDPR
C.
PCI DSS
D.
ISO
PCI DSS
Reference: https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard
Page 9 out of 40 Pages |
Previous |