- (Exam Topic 3)
An organization has the following policy statements:
• AlI emails entering or leaving the organization will be subject to inspection for malware, policy violations, and unauthorized coolant.
•AM network activity will be logged and monitored.
• Confidential data will be tagged and tracked
• Confidential data must never be transmitted in an unencrypted form.
• Confidential data must never be stored on an unencrypted mobile device. Which of the following is the organization enforcing?
Correct Answer:
B
- (Exam Topic 1)
A security analyst reviews the following aggregated output from an Nmap scan and the border firewall ACL:
Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?
Correct Answer:
B
- (Exam Topic 2)
Understanding attack vectors and integrating intelligence sources are important components of:
Correct Answer:
C
threat hunting activities.
* 1. Establishing a hypothesis,
* 2. Profile threat actors/activities,
* 3. Threat hunting tactics,
* 4. Reducing attack surface,
* 5. Bundle critical systems/assets into groups/protected zones,
* 6. Attack vectors understood, assessed and addressed
* 7. Integrated intelligence
* 8. Improving detection capabilities.
- (Exam Topic 1)
A human resources employee sends out a mass email to all employees that contains their personnel records. A security analyst is called in to address the concern of the human resources director on how to prevent this from happening in the future.
Which of the following would be the BEST solution to recommend to the director?
Correct Answer:
A
- (Exam Topic 1)
A threat feed notes malicious actors have been infiltrating companies and exfiltration data to a specific set of domains Management at an organization wants to know if it is a victim Which of the following should the security analyst recommend to identity this behavior without alerting any potential malicious actors?
Correct Answer:
D