- (Exam Topic 1)
Which of the following is the MOST important objective of a post-incident review?
Correct Answer:
A
- (Exam Topic 3)
A security analyst at exampte.com receives a SIEM alert for an IDS signature and reviews the associated packet capture and TCP stream:
Winch of the following actions should the security analyst lake NEXT?
Correct Answer:
D
- (Exam Topic 2)
An analyst needs to provide a recommendation that will allow a custom-developed application to have full access to the system's processors and peripherals but still be contained securely from other applications that will be developed. Which of the following is the BEST technology for the analyst to recommend?
Correct Answer:
D
- (Exam Topic 1)
A security analyst receives an alert that highly sensitive information has left the company's network Upon investigation, the analyst discovers an outside IP range has had connections from three servers more than 100 times m the past month The affected servers are virtual machines Which of the following is the BEST course of action?
Correct Answer:
A
- (Exam Topic 2)
Understanding attack vectors and integrating intelligence sources are important components of:
Correct Answer:
C
threat hunting activities.
* 1. Establishing a hypothesis,
* 2. Profile threat actors/activities,
* 3. Threat hunting tactics,
* 4. Reducing attack surface,
* 5. Bundle critical systems/assets into groups/protected zones,
* 6. Attack vectors understood, assessed and addressed
* 7. Integrated intelligence
* 8. Improving detection capabilities.