Which of the following describes the category of data that is most impacted when it is lost?
Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?
A security analyst investigates an incident in which a PowerShell script was identified as a potential IoC. Which of the following will best help the analyst identify an attempt to compromise the system?
Which of the following would best prepare a security team for a specific incident response scenario?
Which of the following are the best for hardening end-user devices? (Selecttwo)
A security analyst receives an alert from a web server that contains the following logs:
GET /image?filename=../../../etc/passwd
Host: AcmeInc.web.net
useragent: python-request/2.27.1
GET /image?filename=../../../etc/shadow
Host: AcmeInc.web.net
useragent: python-request/2.27.1
Which of the following attacks is being attempted?
A company uses its backups to recover from a ransomware attack. Which of the following best guarantees that the backups are not infected?
A security analyst is investigating an alert that was produced by endpoint protection software. The analyst determines this event was a false positive triggered by an employee who attempted to download a file. Which of the following is the most likely reason the download was blocked?
Which of the following best protects sensitive data in transit across a geographically dispersed Infrastructure?
A business needs a recovery site but does not require immediate failover. The business also wants to reduce the workload required to recover from an outage. Which of the following recovery sites is the best option?
A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company ' s reliance on open-source libraries?
Which of the following strategies most effectively protects sensitive data at rest in a database?
An unknown source has attacked an organization’s network multiple times. The organization has a firewall but no other source of protection against these attacks. Which of the following is the best security item to add?