Question 11

Refer to the exhibit.

An engineer is reverse engineering a suspicious file by examining its resources. What does this file indicate?
  • Question 12

    Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right.

    Question 13

    Refer to the exhibit.

    Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)
  • Question 14

    Employees receive an email from an executive within the organization that summarizes a recent security breach and requests that employees verify their credentials through a provided link. Several employees report the email as suspicious, and a security analyst is investigating the reports. Which two steps should the analyst take to begin this investigation? (Choose two.)
  • Question 15

    A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)