A security analyst is reviewing a recent vulnerability scan report for a new server infrastructure. The analyst would like to make the best use of time by resolving the most critical vulnerability first. The following information is provided:
Which of the following should the analyst concentrate remediation efforts on first?
A network analyst notices a long spike in traffic on port 1433 between two IP addresses on opposite sides of a WAN connection. Which of the following is the most likely cause?
A security analyst has just received an incident ticket regarding a ransomware attack. Which of the following would most likely help an analyst properly triage the ticket?
Which of the following is the most important reason for an incident response team to develop a formal incident declaration?
A Chief Information Security Officer has requested a dashboard to share critical vulnerability management goals with company leadership.
Which of the following would be the best to include in the dashboard?
A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the following implications should be considered on the new hybrid environment?
A security analyst reviews the following Arachni scan results for a web application that stores PII data:
Which of the following should be remediated first?
Which of the following will most likely cause severe issues with authentication and logging?
A SOC analyst identifies the following content while examining the output of a debugger command over a client-server application:
getconnection (database01, " alpha " , " AXTV. 127GdCx94GTd " ) ;
Which of the following is the most likely vulnerability in this system?
Which of the following threat actors is most likely to target a company due to its questionable environmental policies?