Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An engineer is investigating several cases of increased incoming spam emails and suspicious emails from the HR and service departments. While checking the event sources, the website monitoring tool showed several web scraping alerts overnight. Which type of compromise is indicated?

A.

phishing

B.

dumpster diving

C.

social engineering

D.

privilege escalation

Refer to the exhibit.

An engineer is performing a static analysis on a malware and knows that it is capturing keys and webcam events on a company server. What is the indicator of compromise?

A.

The malware is performing comprehensive fingerprinting of the host, including a processor, motherboard manufacturer, and connected removable storage.

B.

The malware is a ransomware querying for installed anti-virus products and operating systems to encrypt and render unreadable until payment is made for file decryption.

C.

The malware has moved to harvesting cookies and stored account information from major browsers and configuring a reverse proxy for intercepting network activity.

D.

The malware contains an encryption and decryption routine to hide URLs/IP addresses and is storing the output of loggers and webcam captures in locally encrypted files for retrieval.

What is the impact of hardening machine images for deployment?

A.

reduces the attack surface

B.

increases the speed of patch deployment

C.

reduces the steps needed to mitigate threats

D.

increases the availability of threat alerts

An engineer detects an intrusion event inside an organization’s network and becomes aware that files that contain personal data have been accessed. Which action must be taken to contain this attack?

A.

Disconnect the affected server from the network.

B.

Analyze the source.

C.

Access the affected server to confirm compromised files are encrypted.

D.

Determine the attack surface.

A company recently started accepting credit card payments in their local warehouses and is undergoing a PCI audit. Based on business requirements, the company needs to store sensitive authentication data for 45 days. How must data be stored for compliance?

A.

post-authorization by non-issuing entities if there is a documented business justification

B.

by entities that issue the payment cards or that perform support issuing services

C.

post-authorization by non-issuing entities if the data is encrypted and securely stored

D.

by issuers and issuer processors if there is a legitimate reason

A customer is using a central device to manage network devices over SNMPv2. A remote attacker caused a denial of service condition and can trigger this vulnerability by issuing a GET request for the ciscoFlashMIB OID on an affected device. Which should be disabled to resolve the issue?

A.

SNMPv2

B.

TCP small services

C.

port UDP 161 and 162

D.

UDP small services

An engineer receives an incident ticket with hundreds of intrusion alerts that require investigation. An analysis of the incident log shows that the alerts are from trusted IP addresses and internal devices. The final incident report stated that these alerts were false positives and that no intrusions were detected. What action should be taken to harden the network?

A.

Move the IPS to after the firewall facing the internal network

B.

Move the IPS to before the firewall facing the outside network

C.

Configure the proxy service on the IPS

D.

Configure reverse port forwarding on the IPS

An organization had an incident with the network availability during which devices unexpectedly malfunctioned. An engineer is investigating the incident and found that the memory pool buffer usage reached a peak before the malfunction. Which action should the engineer take to prevent this issue from reoccurring?

A.

Disable memory limit.

B.

Disable CPU threshold trap toward the SNMP server.

C.

Enable memory tracing notifications.

D.

Enable memory threshold notifications.

A security analyst receives an escalation regarding an unidentified connection on the Accounting A1 server within a monitored zone. The analyst pulls the logs and discovers that a Powershell process and a WMI tool process were started on the server after the connection was established and that a PE format file was created in the system directory. What is the next step the analyst should take?

A.

Isolate the server and perform forensic analysis of the file to determine the type and vector of a possible attack

B.

Identify the server owner through the CMDB and contact the owner to determine if these were planned and identifiable activities

C.

Review the server backup and identify server content and data criticality to assess the intrusion risk

D.

Perform behavioral analysis of the processes on an isolated workstation and perform cleaning procedures if the file is malicious

An engineer is going through vulnerability triage with company management because of a recent malware outbreak from which 21 affected assets need to be patched or remediated. Management decides not to prioritize fixing the assets and accepts the vulnerabilities. What is the next step the engineer should take?

A.

Investigate the vulnerability to prevent further spread

B.

Acknowledge the vulnerabilities and document the risk

C.

Apply vendor patches or available hot fixes

D.

Isolate the assets affected in a separate network