Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the difference between indicator of attack (loA) and indicators of compromise (loC)?

A.

loA is the evidence that a security breach has occurred, and loC allows organizations to act before the vulnerability can be exploited.

B.

loA refers to the individual responsible for the security breach, and loC refers to the resulting loss.

C.

loC is the evidence that a security breach has occurred, and loA allows organizations to act before the vulnerability can be exploited.

D.

loC refers to the individual responsible for the security breach, and loA refers to the resulting loss.

An analyst received a ticket regarding a degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed a disabled antivirus software and was not able to determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?

A.

Recovery

B.

Detection

C.

Eradication

D.

Analysis

Which access control should a chief information security officer select to protect extremely sensitive data categorized at various levels of confidentiality?

A.

MAC; each object owner is responsible to provide access only to authorized users.

B.

MAC; access control decisions are centrally managed and minimize the human error probability.

C.

DAC; access control decisions are centrally managed and minimize the human error probability.

D.

DAC; each object owner is responsible to provide access only to authorized users.

Refer to the exhibit.

A SOC analyst received a message from SIEM about abnormal activity on the Windows server The analyst checked the Windows event log and saw numerous Audit Failures logs. What is occurring?

A.

Windows failed to audit the logs

B.

regular Windows log

C.

brute-force attack

D.

DoS attack

Refer to the exhibit. What is occurring?

A.

denial-of-service attack

B.

man-in-the-middle attack

C.

brute-force attack

D.

ARP spoofing attack

Which artifact is used to uniquely identify a detected file?

A.

file timestamp

B.

file extension

C.

file size

D.

file hash

A security analyst received a ticket about suspicious traffic from one of the workstations. During the investigation, the analyst discovered that the workstation was communicating with an external IP. The analyst could not investigate further and escalated the case to a T2 security analyst. What are the two data visibility challenges that the security analyst should identify? (Choose two.)

A.

A default user agent is present in the headers.

B.

Traffic is not encrypted.

C.

HTTP requests and responses are sent in plaintext.

D.

POST requests have a "Microsoft-IIS/7.5" server header.

E.

Encrypted data is being transmitted.

Which security principle is violated by running all processes as root or administrator?

A.

principle of least privilege

B.

role-based access control

C.

separation of duties

D.

trusted computing base

What is a benefit of using asymmetric cryptography?

A.

decrypts data with one key

B.

fast data transfer

C.

secure data transfer

D.

encrypts data with one key

Which type of data consists of connection level, application-specific records generated from network traffic?

A.

transaction data

B.

location data

C.

statistical data

D.

alert data