Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Traditional SIEM systems provide:

A.

Unknown Attacks Analysis User Behavior Analysis and Network Anomalies

B.

Aggregation, Normalization, Correlation, and Alerting.

C.

Static Malware Analysis, Dynamic Malware Analysis, and Hybrid Malware Analysis.

D.

Privileged Identity Management. Privileged Access Management, and Identity and Access Management.

Which of the following should normally be blocked through a firewall?

A.

SNMP

B.

SMTP

C.

NTP

D.

POP3

Which of the following represents a front-end security capability that addresses cyber resiliency?

A.

Multi-factor authentication

B.

Immutability of backups

C.

Key management

D.

Physical separation of backups

A system administrator has been tasked with developing highly detailed instructions for patching managed assets using the corporate patch management solution. These instructions are an example of which of the following?

A.

Process

B.

Procedure

C.

Standard

D.

Policy

A security administrator needs to review events from different systems located worldwide. Which of the

following is MOST important to ensure that logs can be effectively correlated?

A.

Logs should be synchronized to their local time zone.

B.

Logs should be synchronized to a common, predefined time source.

C.

Logs should contain the username of the user performing the action.

D.

Logs should include the physical location of the action performed.

When tracing an attack to the point of origin, which of the following items is critical data to map layer 2 switching?

A.

DNS cache

B.

ARP cache

C.

CAM table

D.

NAT table

Organizations considered “covered entities” are required to adhere to which compliance requirement?

A.

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

B.

Payment Card Industry Data Security Standard (PCI DSS)

C.

Sarbanes-Oxley Act (SOX)

D.

International Organization for Standardization (ISO) 27001

Which of the following tools can be used as an intrusion detection system (IDS)? (Choose three.)

A.

Bro

B.

Wireshark/tshark

C.

Metasploit

D.

Suricata

E.

Snort

An incident handler is assigned to initiate an incident response for a complex network that has been affected

by malware. Which of the following actions should be taken FIRST?

A.

Make an incident response plan.

B.

Prepare incident response tools.

C.

Isolate devices from the network.

D.

Capture network traffic for analysis.

Network infrastructure has been scanned and the identified issues have been remediated. What is the next step in the vulnerability assessment process?

A.

Generating reports

B.

Establishing scope

C.

Conducting an audit

D.

Assessing exposures