Question 21
As part of a review of incident response plans, which of the following is MOST important for an organization to understand when establishing the breach notification period?
Question 22
A security analyst is investigating a compromised Linux server. The analyst issues the ps command and receives the following output:

Which of the following commands should the administrator run NEXT to further analyze the compromised system?

Which of the following commands should the administrator run NEXT to further analyze the compromised system?
Question 23
A team of security analysts has been alerted to potential malware activity. The initial examination indicates one of the affected workstations is beaconing on TCP port 80 to five IP addresses and attempting to spread across the network over port 445.
Which of the following should be the team's NEXT step during the detection phase of this response process?
Which of the following should be the team's NEXT step during the detection phase of this response process?
Question 24
Which of the following sources would a security analyst rely on to provide relevant and timely threat information concerning the financial services industry?
Question 25
The help desk has reported that users are reusing previous passwords when prompted to change them.
Which of the following would be the MOST appropriate control for the security analyst to configure to prevent password reuse? (Choose two.)
Which of the following would be the MOST appropriate control for the security analyst to configure to prevent password reuse? (Choose two.)