A Chief Information Security Officer (CISO) wants to disable a functionality on a business -critical web application that is vulnerable to RCE in order to maintain the minimum risk level with minimal increased cost. Which of the following risk treatments best describes what the CISO is looking for?
HOTSPOT A company recently experienced a security incident. The security team has determined a user clicked on a link embedded in a phishing email that was sent to the entire company. The link resulted in a malware download, which was subsequently installed and run. INSTRUCTIONS Part 1 Review the artifacts associated with the security incident. Identify the name of the malware, the Exam Dum ps 146 /298 malicious IP address, and the date and time when the malware executable entered the organization. Part 2 Review the kill chain items and select an appropriate control for each that would improve the security posture of the organization and would have helped to prevent this incident from occurring. Each control may only be used once, and not all controls will be used. Firewall log: File integrity Monitoring Report: Exam Dum ps 147 /298 Malware domain list: Exam Dum ps 148 /298 Vulnerability Scan Report: Exam Dum ps 149 /298 Phishing Email: Exam Dum ps 150 /298 Explanation: xam Dum ps 151 /298
Which of the following is a nation -state actor least likely to be concerned with?
A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?
Which of the following most accurately describes the Cyber Kill Chain methodology?
A recent zero-day vulnerability is being actively exploited, requires no user interaction or privilege escalation, and has a significant impact to confidentiality and integrity but not to availability. Which of the following CVE metrics would be most accurate for this zero -day threat?