- (Exam Topic 6)
A company recently experienced a major breach. An investigation concludes that customer credit card data was stolen and exfiltrated through a dedicated business partner connection to a vendor, who is not held to the same security contral standards. Which of the following is the MOST likely source of the breach?
Correct Answer:
C
- (Exam Topic 5)
Which of the following should a technician consider when selecting an encryption method for data that needs to remain confidential for a specific length of time?
Correct Answer:
B
- (Exam Topic 3)
An organization needs to implement more stringent controls over administrator/root credentials and service
accounts. Requirements for the project include: Check-in/checkout of credentials
The ability to use but not know the password Automated password changes
Logging of access to credentials
Which of the following solutions would meet the requirements?
Correct Answer:
D
- (Exam Topic 3)
The process of passively gathering information poor to launching a cyberattack is called:
Correct Answer:
B
- (Exam Topic 3)
A security analyst is investigating an incident to determine what an attacker was able to do on a compromised laptop. The analyst reviews the following SIEM log:
Which of the following describes the method that was used to compromise the laptop?
Correct Answer:
A