DRAG DROP -
Drag and drop the telemetry-related considerations from the left onto their cloud service models on the right.
Select and Place:
Answer :
A companyג€™s web server availability was breached by a DDoS attack and was offline for 3 hours because it was not deemed a critical asset in the incident response playbook. Leadership has requested a risk assessment of the asset. An analyst conducted the risk assessment using the threat sources, events, and vulnerabilities. Which additional element is needed to calculate the risk?
Answer : D
DRAG DROP -
Drag and drop the components from the left onto the phases of the CI/CD pipeline on the right.
Select and Place:
Answer :
Reference:
https://www.densify.com/resources/continuous-integration-delivery-phases
An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)
Answer : AB
How is a SIEM tool used?
Answer : D
Reference:
https://www.varonis.com/blog/what-is-siem/
Answer : D
Reference:
https://stackoverflow.com/questions/2577545/why-is-this-program-cannot-be-run-in-dos-mode-text-present-in-dll-files#:~:text=The%20linker%20places
%20a%20default,using%20the%20%2FSTUB%20linker%20option.&text=This%20information%20enables%20Windows%20to,has%20an%20MS-DOS%20stub
.
Answer : B
An audit is assessing a small business that is selling automotive parts and diagnostic services. Due to increased customer demands, the company recently started to accept credit card payments and acquired a POS terminal. Which compliance regulations must the audit apply to the company?
Answer : D
Reference:
https://upserve.com/restaurant-insider/restaurant-pos-pci-compliance-checklist/
A customer is using a central device to manage network devices over SNMPv2. A remote attacker caused a denial of service condition and can trigger this vulnerability by issuing a GET request for the ciscoFlashMIB OID on an affected device. Which should be disabled to resolve the issue?
Answer : A
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2018-0161
DRAG DROP -
Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right.
Select and Place:
Answer :
Refer to the exhibit. Which indicator of compromise is represented by this STIX?
Answer : C
Refer to the exhibit. What is occurring in this packet capture?
Answer : B
DRAG DROP -
Drag and drop the cloud computing service descriptions from the left onto the cloud service categories on the right.
Select and Place:
Answer :
Answer : D
An engineer is moving data from NAS servers in different departments to a combined storage database so that the data can be accessed and analyzed by the organization on-demand. Which data management process is being used?
Answer : A