- (Exam Topic 5)
The following are the logs of a successful attack.
Which of the following controls would be BEST to use to prevent such a breach in the future?
Correct Answer:
D
- (Exam Topic 4)
A security analyst has been reading about a newly discovered cyberattack from a known threat actor. Which of the following would BEST support the analyst's review of the tactics, techniques, and protocols the threat actor was observed using in previous campaigns?
Correct Answer:
B
- (Exam Topic 2)
A forensics investigator is examining a number of unauthorized payments the were reported on the company's website. Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribe. One of the users reported the email to the phishing team, and the forwarded email revealed the link to be:
Click here to unsubscribe
Which of the following will the forensics investigator MOST likely determine has occurred?
Correct Answer:
D
- (Exam Topic 5)
A company is required to continue using legacy software to support a critical service. Which of the following BEST explains a risk of this practice?
Correct Answer:
C
- (Exam Topic 3)
A symmetric encryption algorithm Is BEST suited for:
Correct Answer:
D