Question 166

Which of the following would satisfy three-factor authentication?
  • Question 167

    Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?
  • Question 168

    A security analyst is investigating an incident to determine what an attacker was able to do on a compromised laptop. The analyst reviews the following SIEM log:
    Which of the following describes the method that was used to compromise the laptop?
  • Question 169

    A security analyst sees the following log output while reviewing web logs:

    Which of the following mitigation strategies would be BEST to prevent this attack from being successful?
  • Question 170

    An analyst has determined that a server was not patched and an external actor exfiltrated data on port 139. Which of the following sources should the analyst review to BEST ascertain how the Incident could have been prevented?