Question 26

A company's SOC has received threat intelligence about an active campaign utilizing a specific vulnerability. The company would like to determine whether it is vulnerable to this active campaign.
Which of the following should the company use to make this determination?
  • Question 27

    A cybersecurity analyst discovered a private key that could have been exposed.
    Which of the following is the BEST way for the analyst to determine if the key has been compromised?
  • Question 28

    A security team received a regulatory notice asking for information regarding collusion and pricing from staff members who are no longer with the organization. The legal department provided the security team with a list of search terms to investigate.
    This is an example of:
  • Question 29

    Given the following log snippet from a web server:

    Which of the following BEST describes this type of attack?
  • Question 30

    A security architect for a large, multinational manufacturer needs to design and implement a security solution to monitor traffic.
    When designing the solution, which of the following threats should the security architect focus on to prevent attacks against the OT network?