- (Exam Topic 2)
A security team identified some specific known tactics and techniques to help mitigate repeated credential access threats, such as account manipulation and brute forcing. Which of the following frameworks or models did the security team MOST likely use to identify the tactics and techniques'?
Correct Answer:
C
- (Exam Topic 2)
An organisation is assessing risks so it can prioritize its mitigation actions. Following are the risks and their probability and impact:
Which of the following is the order of priority for risk mitigation from highest to lowest?
Correct Answer:
A
- (Exam Topic 1)
An analyst is investigating an anomalous event reported by the SOC. After reviewing the system logs the analyst identifies an unexpected addition of a user with root-level privileges on the endpoint. Which of the following data sources will BEST help the analyst to determine whether this event constitutes an incident?
Correct Answer:
D
- (Exam Topic 2)
Which of the following assessment methods should be used to analyze how specialized software performs during heavy loads?
Correct Answer:
A
- (Exam Topic 1)
A company was recently awarded several large government contracts and wants to determine its current risk from one specific APT.
Which of the following threat modeling methodologies would be the MOST appropriate to use during this analysis?
Correct Answer:
B
Reference: https://www.secureworks.com/blog/advanced-persistent-threats-apt-b