Question 21

A cyber-incident response analyst is investigating a suspected cryptocurrency miner on a company's server.
Which of the following is the FIRST step the analyst should take?
  • Question 22

    A company wants to establish a threat-hunting team. Which of the following BEST describes the rationale for integration intelligence into hunt operations?
  • Question 23

    A security analyst is conceded that a third-party application may have access to user passwords during authentication. Which of the following protocols should the application use to alleviate the analyst's concern?
  • Question 24

    Which of the following BEST describes what an organizations incident response plan should cover regarding how the organization handles public or private disclosures of an incident?
  • Question 25

    Approximately 100 employees at your company have received a phishing email. As a security analyst you have been tasked with handling this situation.
    INSTRUCTIONS
    Review the information provided and determine the following:
    1. How many employees clicked on the link in the phishing email?
    2. On how many workstations was the malware installed?
    3. What is the executable file name or the malware?