Question 66

A Chief Information Security Officer has requested a dashboard to share critical vulnerability management goals with company leadership.
Which of the following would be the best to include in the dashboard?
  • Question 67

    A user reports a malware alert to the help desk. A technician verities the alert, determines the workstation is classified as a low-severity device, and uses network controls to block access. The technician then assigns the ticket to a security analyst who will complete the eradication and recovery processes. Which of the following should the security analyst do next?
  • Question 68

    In SIEM software, a security analysis selected some changes to hash signatures from monitored files during the night followed by SMB brute-force attacks against the file servers Based on this behavior, which of the following actions should be taken FIRST to prevent a more serious compromise?
  • Question 69

    K company has recently experienced a security breach via a public-facing service. Analysis of the event on the server was traced back to the following piece of code:
    SELECT ' From userjdata WHERE Username = 0 and userid8 1 or 1=1;-
    Which of the following controls would be best to implement?
  • Question 70

    A company receives a penetration test report summary from a third party. The report summary indicates a proxy has some patches that need to be applied. The proxy is sitting in a rack and is not being used, as the company has replaced it with a new one. The CVE score of the vulnerability on the proxy is a 9.8.
    Which of the following best practices should the company follow with this proxy?