Question 256

During an incident, a cybersecurity analyst found several entries in the web server logs that are related to an IP with a bad reputation . Which of the following would cause the analyst to further review the incident?
A)

B)

C)

D)

E)
  • Question 257

    During an investigation, a security analyst determines suspicious activity occurred during the night shift over the weekend. Further investigation reveals the activity was initiated from an internal IP going to an external website.
    Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in the future?
  • Question 258

    An analyst is investigating an anomalous event reported by the SOC. After reviewing the system logs, the analyst identifies an unexpected addition of a user with root-level privileges on the endpoint. Which of the following data sources will BEST help the analyst to determine whether this event constitutes an incident?
  • Question 259

    A company was recently awarded several large government contracts and wants to determine its current risk from one specific APT.
    Which of the following threat modeling methodologies would be the MOST appropriate to use during this analysis?
  • Question 260

    After receiving reports latency, a security analyst performs an Nmap scan and observes the following output:

    Which of the following suggests the system that produced output was compromised?