Question 41

An incident response report indicates a virus was introduced through a remote host that was connected to corporate resources.
A cybersecurity analyst has been asked for a recommendation to solve this issue.
Which of the following should be applied?
  • Question 42

    As part of a review of modern response plans, which of the following is MOST important for an organization lo understand when establishing the breach notification period?
  • Question 43

    An analyst is reviewing a list of vulnerabilities, which were reported from a recent vulnerability scan of a Linux server.
    Which of the following is MOST likely to be a false positive?
  • Question 44

    A cybersecurity analyst has been asked to follow a corporate process that will be used to manage vulnerabilities for an organization. The analyst notices the policy has not been updated in three years. Which of the following should the analyst check to ensure the policy is still accurate?
  • Question 45

    Which of the following software assessment methods would be BEST for gathering data related to an application's availability during peak times?