Question 156

industry partners from critical infrastructure organizations were victims of attacks on their SCADA devices. The attacks used privilege escalation to gain access to SCADA administration and access management solutions would help to mitigate this risk?
  • Question 157

    A large organization wants to move account registration services to the cloud to benefit from faster processing and elasticity. Which of the following should be done FIRST to determine the potential risk to the organization?
  • Question 158

    A cybersecurity analyst is establishing a threat hunting and intelligence group at a growing organization. Which of the following is a collaborative resource that would MOST likely be used for this purpose?
  • Question 159

    SIMULATION
    Malware is suspected on a server in the environment.
    The analyst is provided with the output of commands from servers in the environment and needs to review all output files in order to determine which process running on one of the servers may be malware.
    INSTRUCTIONS
    Servers 1, 2, and 4 are clickable. Select the Server and the process that host the malware.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


    Question 160

    An analyst identifies multiple instances of node-to-node communication between several endpoints within the 10.200.2.0/24 network and a user machine at the IP address 10.200.2.5. This user machine at the IP address 10.200.2.5 is also identified as initiating outbound communication during atypical business hours with several IP addresses that have recently appeared on threat feeds.
    Which of the following can be inferred from this activity?