- (Exam Topic 1)
Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?
Correct Answer:
C
- (Exam Topic 5)
ir security team received a report of copyright infringement from the IP space of the corporate network. The report provided a precise time stamp for the incident as well as the name of the copyrighted file“sThe analyst has been tasked with determining the infringing source machine and instructed to implement measures to prevent such incidents from occurring again. Which of the following is MOST capable of accomplishing both tasks?
Correct Answer:
C
- (Exam Topic 5)
A secunity engineer needs to create a network segment that can be used for servers thal require connections from untrusted networks. Which of the following should the engineer implement?
Correct Answer:
D
- (Exam Topic 6)
Which of the following authentication methods is considered to be the LEAST secure?
Correct Answer:
B
- (Exam Topic 4)
An analyst has determined that a server was not patched and an external actor exfiltrated data on port 139. Which of the following sources should the analyst review to BEST ascertain how the incident could have been prevented?
Correct Answer:
A