Question 21

SIMULATION
Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question 22

After being alerted to potential anomalous activity related to trivial DNS lookups, a security analyst looks at the following output of implemented firewall rules:

The analyst notices that the expected policy has no hit count for the day. Which of the following MOST likely occurred?
  • Question 23

    A company just implemented a new telework policy that allows employees to use personal devices for official email and file sharing while working from home. Some of the requirements are:
    * Employees must provide an alternate work location (i.e., a home address).
    * Employees must install software on the device that will prevent the loss of proprietary data but will not restrict any other software from being installed.
    Which of the following BEST describes the MDM options the company is using?
  • Question 24

    The SOC is reviewing processes and procedures after a recent incident. The review indicates it took more than
    30 minutes to determine that quarantining an infected host was the best course of action. This allowed the malware to spread to additional hosts before it was contained. Which of the following would be BEST to improve the incident response process?
  • Question 25

    A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts.
    For which of the following is the company hiring the consulting firm?