Chapter 3 Flashcards
(104 cards)
Chief information security officer wants to disable a functionality on a business critical web application that is vulnerable to RCE in order to maintain the minimum risk level with minimal increased cost which of the following risk treatments. Best describes with CISO is looking for.
Mitigate
Security analyst can review the windows registry on end points to get insights into
System critical configuration items
An analyst is trying to capture anonymous traffic from a compromise house, which of the following are the best tools for achieving the objective
TCP dump wire shark
A security analyst text and email server that had been compromised in in the internal network. You have been reporting messages in their inbox and unusual network which of the following incident response should perform next.
Containment 
Which of the following can be used to learn more about TTP’s used by cyber criminals
MITRE ATT& CK
Which of the following will most likely ensure that Mission critical services are available in the event of an incident?
Business continuity plan
The cyber security analyst is doing triage in an SIEM and notices that the timestamp between the firewall and the host under investigation are off by 43 minutes, which of the following is the most likely scenario occurring with the timestamps
The NTP server is not configured on the host
An analyst is becoming overwhelmed with the number of events that need to be investigated for a timeline which of the following should the analyst focus on in order to move the incident forward
Impact
A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attack which of the following best describes the current stage of the cyber killer chain that actor is currently operating in.
Exploitation
A security analyst is tasked with prioritizing vulnerabilities for remediation. The relevant companies security policies are shown below security policy one 006 vulnerability management the company she’ll use CVS SV 3.1 base score metrics exploit ability and impact to prioritize, their remediation of security, vulnerabilities and situations where a choice must be made between confidentiality and availability. The company shall prioritize confidentiality over dataavailability of systems and data. The company shall prioritize patching of pebbly, available systems and services over patching of internally available system, according to the security policy, which of the vulnerability should be the highest priority to patch.
Name.shield CVSS 3.1/AV;and/AC; L/PR; N/UI; N/S; you/C; H/I; N/a; N external system
Company is in the middle of an incident and the customer data has been breached. Which of the following should the Company contact first
 legal on the event of a data breach involving customer information legal team should be contacted first
During an incident in which a user machine was compromised and analyst recovered a binary file that potentially causes exploitation, which of the following techniques could be used for their analysis
Static analysis
During a cyber security incident, one of the web servers at the perimeter network was affected by ransom, which of the following actions should be performed immediately
Quarantine the server
During an extended holiday break a company suffered a security incident. This information was properly relayed to appropriate personal and a timely manner, and the server was up-to-date and configured with appropriate auditing and logging the Chief information. Security officer wants to find out precisely what happened which of the following actions should the analyst take first
Clone the virtual server for forensic analysis
A chief information security officer has requested a dashboard to share critically vulnerability management goals with the company leadership which of the following would be best to include in the dashboard
KPI key performance indicator is the most appropriate element to include in the dashboards KPI’s are measurable values that help progress toward achieving specific business or security goals
Given the following CVS S string CVSS; 3.0/AV; N/AC; L/PR; N/UI; N/S; you/C; H/I; H/a; H
The vulnerability is network based
When starting an investigation, which of the following must be done first
Secure scene
The security analyst received the monthly vulnerability report. The following findings were included in the report. A five of the systems only required a reboot to finalize the patch application. B2 of the servers are running outdated operating systems, and cannot be patched. The analyst determines that the only way to ensure these service cannot be compromised is to isolate them. Which of the following approaches will best minimize. The risk of the servers is being compromised.
Compensating controls
Hey SOC analyst is analyzing traffic on a network. It notices an unauthorized scan, which of the following types of activities is being observed.
A potential precursor to attack
A laptop that is company owned and managed is suspected to have Malware the company implemented centralized security logging which of the following log sources will confirm the malware infection
XDR logs
During an incident, some LLCs of possible ransom contamination were found in a group of servers and a segment of the network, which of the following steps should be taken next
Isolation
The user is flagged for consistently consuming a high volume of network bandwidth over the past week during the investigation the security analyst funds to the following websites Gmail bites out 525984 which of the following data flows. Should the analyst investigate first.
gmail.com
An analyst investigated website and produce the following, which of the following in taxes, the analyst use discover the application versions on this vulnerability
NMAP -SV -T4 -F insecure.org
While reviewing Web server logs and analyst notices several entities with the same time stamps, but all contain all characters in the request line which of the following steps should be taken next
Determine what attack the odd characters are indicative of