Question 31

A cybersecurity analyst has access to several threat feeds and wants to organize them while simultaneously comparing intelligence against network traffic.
Which of the following would BEST accomplish this goal?
  • Question 32

    A security analyst for a large financial institution is creating a threat model for a specific threat actor that is likely targeting an organization's financial assets.
    Which of the following is the BEST example of the level of sophistication this threat actor is using?
  • Question 33

    A system's authority to operate (ATO) is set to expire in four days. Because of other activities and limited staffing, the organization has neglected to start reauthentication activities until now. The cybersecurity group just performed a vulnerability scan with the partial set of results shown below:

    Based on the scenario and the output from the vulnerability scan, which of the following should the security team do with this finding?
  • Question 34

    An analyst is searching a log for potential credit card leaks. The log stores all data encoded in hexadecimal. Which of the following commands will allow the security analyst to confirm the incident?
  • Question 35

    A security analyst is reviewing vulnerability scan results and notices new workstations are being flagged as having outdated antivirus signatures. The analyst observes the following plugin output:
    Antivirus is installed on the remote host:
    Installation path: C:\Program Files\AVProduct\Win32\
    Product Engine: 14.12.101
    Engine Version: 3.5.71
    Scanner does not currently have information about AVProduct version 3.5.71. It may no longer be supported.
    The engine version is out of date. The oldest supported version from the vendor is 4.2.11.
    The analyst uses the vendor's website to confirm the oldest supported version is correct.
    Which of the following BEST describes the situation?