Question 186

A firewall specialist has been newly assigned to participate in red team exercises and needs to ensure the skills represent real-world threats.
Which of the following would be the BEST choice to help the new team member learn bleeding-edge techniques?
  • Question 187

    A breach was caused by an insider threat in which customer PII was compromised. Following the breach, a lead security analyst is asked to determine which vulnerabilities the attacker used to access company resources.
    Which of the following should the analyst use to remediate the vulnerabilities?
  • Question 188

    An investigator wants to collect the most volatile data first in an incident to preserve the data that runs the highest risk of being lost. After memory, which of the following BEST represents the remaining order of volatility that the investigator should follow?
  • Question 189

    A medical device company is implementing a new COTS antivirus solution in its manufacturing plant. All validated machines and instruments must be retested for interoperability with the new software.
    Which of the following would BEST ensure the software and instruments are working as designed?
  • Question 190

    An enterprise with global sites processes and exchanges highly sensitive information that is protected under several countries' arms trafficking laws. There is new information that malicious nation-state-sponsored activities are targeting the use of encryption between the geographically disparate sites. The organization currently employs ECDSA and ECDH with P-384, SHA-384, and AES-256-GCM on VPNs between sites. Which of the following techniques would MOST likely improve the resilience of the enterprise to attack on cryptographic implementation?