Question 31

Which of the following is the most important factor to ensure accurate incident response reporting?
  • Question 32

    Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the general public, as a best practice? (Select two).
  • Question 33

    An IT professional is reviewing the output from the top command in Linux. In this company, only IT and security staff are allowed to have elevated privileges. Both departments have confirmed they are not working on anything that requires elevated privileges. Based on the output below:
    PID
    USER
    VIRT
    RES
    SHR
    %CPU
    %MEM
    TIME+
    COMMAND
    34834
    person
    4980644
    224288
    111076
    5.3
    14.44
    1:41.44
    cinnamon
    34218
    person
    51052
    30920
    23828
    4.7
    0.2
    0:26.54
    Xorg
    2264
    root
    449628
    143500
    26372
    14.0
    3.1
    0:12.38
    bash
    35963
    xrdp
    711940
    42356
    10560
    2.0
    0.2
    0:06.81
    xrdp
    Which of the following PIDs is most likely to contribute to data exfiltration?
  • Question 34

    An analyst needs to provide recommendations based on a recent vulnerability scan:

    Which of the following should the analyst recommend addressing to ensure potential vulnerabilities are identified?
  • Question 35

    To minimize the impact of a security incident in a heavily regulated company, a cybersecurity analyst has configured audit settings in the organization's cloud services. Which of the following security controls has the analyst configured?