Question 66

An organization recently had its strategy posted to a social media website. The document posted to the website is an exact copy of a document stored on only one server in the organization. A security analyst sees the following output from a command-line entry on the server suspected of the problem:

Which of the following would be the BEST course of action?
  • Question 67

    Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?
  • Question 68

    A security analyst is responding to an incident on a web server on the company network that is making a large number of outbound requests over DNS Which of the following is the FIRST step the analyst should take to evaluate this potential indicator of compromise'?
  • Question 69

    A Chief Information Security Officer (CISO) is concerned the development team, which consists of contractors, has too much access to customer data.
    Developers use personal workstations, giving the company little to no visibility into the development activities.
    Which of the following would be BEST to implement to alleviate the CISO's concern?
  • Question 70

    A cybersecurity analyst is reading a daily intelligence digest of new vulnerabilities The type of vulnerability that should be disseminated FIRST is one that: