Question 236

The security operations team is conducting a mock forensics investigation. Which of the following should be the FIRST action taken after seizing a compromised workstation?
  • Question 237

    A cybersecurity analyst has received the laptop of a user who recently left the company.
    The analyst types `history' into the prompt, and sees this line of code in the latest bash history:

    This concerns the analyst because this subnet should not be known to users within the company.
    Which of the following describes what this code has done on the network?
  • Question 238

    An organization needs to limit its exposure to accidental disclosure when employees send emails that contain personal information to recipients outside the company Which of the following technical controls would BEST accomplish this goal?
  • Question 239

    A company recently experienced a break-in whereby a number of hardware assets were stolen through unauthorized access at the back of the building. Which of the following would BEST prevent this type of theft from occurring in the future?
  • Question 240

    Which of the following is MOST effective for correlation analysis by log for threat management?