Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

While performing a dynamic analysis of a malicious file, a security analyst notices the memory address changes every time the process runs. Which of the following controls is most likely preventing the analyst from finding the proper memory address of the piece of malicious code?

A.

Address space layout randomization

B.

Data execution prevention

C.

Stack canary

D.

Code obfuscation

A payroll department employee was the target of a phishing attack in which an attacker impersonated a department director and requested that direct deposit information be updated to a new account. Afterward, a deposit was made into the unauthorized account. Which of the following is one of the first actions the incident response team should take when they receive notification of the attack?

A.

Scan the employee's computer with virus and malware tools.

B.

Review the actions taken by the employee and the email related to the event

C.

Contact human resources and recommend the termination of the employee.

D.

Assign security awareness training to the employee involved in the incident.

A security operations center receives the following alerts related to an organization's cloud tenant:

Which of the following should an analyst do first to identify the initial compromise?

A.

Search audit logs for all activity under project staging-01 and correlate any actions against VM edoif j34.

B.

Search audit logs for userjdoe12@myorg.com and correlate the successful API requests on project staging-oi.

C.

Review audit logs for any successful compute instance actions targeting project staging-oi during the time of the alerts.

D.

Review logs for any audit action targeting compute instance APIs during the time of the alerts on VM fd03lf .

Which of the following best describes the key goal of the containment stage of an incident response process?

A.

To limit further damage from occurring

B.

To get services back up and running

C.

To communicate goals and objectives of theincidentresponse plan

D.

To prevent data follow-on actions by adversary exfiltration

A cybersecurity analyst is participating with the DLP project team to classify the organization's data. Which of the following is the primary purpose for classifying data?

A.

To identify regulatory compliance requirements

B.

To facilitate the creation of DLP rules

C.

To prioritize IT expenses

D.

To establish the value of data to the organization

Which of following would best mitigate the effects of a new ransomware attack that was not properly stopped by the company antivirus?

A.

Install a firewall.

B.

Implement vulnerability management.

C.

Deploy sandboxing.

D.

Update the application blocklist.

Which of the following are the most relevant factors related to vulnerability management reporting and communication within an organization?

A.

Risk assessment, asset inventory, business impact analysis, and business continuity plans

B.

Patch availability, mean time to remediate, dependencies, and disaster recovery plans

C.

False-positive rates, alert volume and characteristics, mean time to detect, and skills inventory

D.

Risk severity levels, timelines, dependencies, and remediation ownership

While reviewing web server logs, a security analyst discovers the following suspicious line:

Which of the following is being attempted?

A.

Remote file inclusion

B.

Command injection

C.

Server-side request forgery

D.

Reverse shell

A cybersecurity analyst is reviewing SIEM logs and observes consistent requests originating from an internal host to a blocklisted external server. Which of the following best describes the activity that is

taking place?

A.

Data exfiltration

B.

Rogue device

C.

Scanning

D.

Beaconing

A company recently experienced a security incident. The security team has determined

a user clicked on a link embedded in a phishing email that was sent to the entire company. The link resulted in a malware download, which was subsequently installed and run.

INSTRUCTIONS

Part 1

Review the artifacts associated with the security incident. Identify the name of the malware, the malicious IP address, and the date and time when the malware executable entered the organization.

Part 2

Review the kill chain items and select an appropriate control for each that would improve the security posture of the organization and would have helped to prevent this incident from occurring. Each

control may only be used once, and not all controls will be used.

Firewall log:

File integrity Monitoring Report:

Malware domain list:

Vulnerability Scan Report:

Phishing Email: