1. Due to new regulations, a company has decided to institute an organizational vulnerability management program and assign the function to the security team.Which of the following frameworks would BEST support the program? (Select two.)(Select 2answers)
A) OWASP B) NIST C) ITIL D) ISO 27000 series E) COBIT
2. The help desk informed a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analysthas determined the email includes an attachment named invoice.zip that contains the following files:Locky.jsxerty.inixerty.libFurther analysis indicates that when the .zip file is opened, it is installing a new version of ransomware on the devices. Which of the following should be done FIRSTto prevent data on the company NAS from being encrypted by infected devices?
A) Disable access to the company VPN. B) Add the URL included in the .js file to the companys web proxy filter. C) Email employees instructing them not to open the invoice attachment. D) Set permissions on file shares to read-only.
3. An organization wants to remediate vulnerabilities associated with its web servers. An initial vulnerability scan has been performed, and analysts are reviewing theresults. Before starting any remediation, the analysts want to remove false positives to avoid spending time on issues that are not actual vulnerabilities. Which of thefollowing would be an indicator of a likely false positive?
A) The scan result version is different from the automated asset inventory. B) Reports show the scanner compliance plug-in is out-of-date. C) Any items labeled low are considered informational only. D) HTTPS entries indicate the web page is encrypted securely.
4. Which of the following principles describes how a security analyst should communicate during an incident?
A) The communication should be limited to trusted parties only. B) The communication should come from law enforcement. C) The communication should be limited to management only. D) The communication should be limited to security staff only.
5. A cybersecurity analyst has several log files to review. Instead of using grep and cat commands, the analyst decides to find a better approach to analyze thelogs. Given a list of tools, which of the following would provide a more efficient way for the analyst to conduct a timeline analysis, do keyword searches, and output areport?
Leave a comment