Question 146

A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company's business type may be able to breach the network and remain inside of it for an extended period of time.
Which of the following techniques should be performed to meet the CISO's goals?
  • Question 147

    Which of the following is a reason proper handling and reporting of existing evidence are important for the investigation and reporting phases of an incident response?
  • Question 148

    A list of loCs released by a government security organization contains the SHA-256 hash for a Microsoft- signed legitimate binary, svchost. exe. Which of the following best describes the result if security teams add this indicator to their detection signatures?
  • Question 149

    An MSSP received several alerts from customer 1, which caused a missed incident response deadline for customer 2. Which of the following best describes the document that was violated?
  • Question 150

    An analyst wants to ensure that users only leverage web-based software that has been pre-approved by the organization. Which of the following should be deployed?