Question 16

An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items.
Which of the following phases establishes the identification and prioritization of critical systems and functions?
  • Question 17

    An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented.
    Which of the following processes can be used to identify potential prevention recommendations?
  • Question 18

    A vulnerability scanner detected an obsolete version of an open-source file-sharing application on one of a company's Linux servers. While the software version is no longer supported by the OSS community, the company's Linux vendor backported fixes, applied them for all current vulnerabilities, and agrees to support the software in the future.
    Based on this agreement, this finding is BEST categorized as a:
  • Question 19

    A security engineer is hardening a company's multihomed SFTP server. When scanning a public-facing network interface, the engineer finds the following ports are open:
    22
    25
    110
    137
    138
    139
    445
    Internal Windows clients are used to transferring files to the server to stage them for customer download as part of the company's distribution process.
    Which of the following would be the BEST solution to harden the system?
  • Question 20

    While investigating a security event, an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were encrypted by ransomware that is demanding payment within 48 hours or all data will be destroyed. The company has no response plans for ransomware.
    Which of the following is the NEXT step the analyst should take after reporting the incident to the management team?