Q1. Which of the following responsibilities does the legal team have during an incident management event? (Select two).
A.Coordinate additional or temporary staffing for recovery efforts.
B. Review and approve new contracts acquired as a result of an event.
C. Advise the incident response team on matters related to regulatory reporting.
D. Ensure all system security devices and procedures are in place.
E. Conduct computer and network damage assessments for insurance.
F. Verify that all security personnel have the appropriate clearances.
Correct Answer: B, C
Q2. Executives at an organization email sensitive financial information to external business partners when negotiating valuable contracts. To ensure the legal validity of these messages, the cybersecurity team recommends a digital signature be added to emails sent by the executives. Which of the following are the primary goals of this recommendation? (Select two).
A.Confidentiality
B. Integrity
C. Privacy
D. Anonymity
E. Non-repudiation
F. Authorization
Correct Answer: B, E
Q3. A security analyst runs the following command: # nmap -T4 -F 192.168.30.30 Starting nmap 7.6 Host is up (0.13s latency) PORT STATE SERVICE 23/tcp open telnet 443/tcp open https 636/tcp open ldaps Which of the following should the analyst recommend first to harden the system?
A.Disable all protocols that do not use encryption.
B. Configure client certificates for domain services.
C. Ensure that this system is behind a NGFW.
D. Deploy a publicly trusted root CA for secure websites.
Correct Answer: A
Q4. A SOC receives several alerts indicating user accounts are connecting to the company's identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?
A.DNS
B. tcpdump
C. Directory
D. IDS
Correct Answer: D
$ 39
Reviews
There are no reviews yet.