Which of the following is the first step that should be performed when establishing a disaster recovery plan?
A technician identifies a vulnerability on a server and applies a software patch. Which of the following should be the next step in the remediation process?
The analyst reviews the following endpoint log entry: Which of the following has occurred?
A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?
Due to reports of unauthorized activity that was occurring on the internal network, an analyst is performing a network discovery. The analyst runs an Nmap scan against a corporate network to evaluate which devices were operating in the environment. Given the following output: Exam Dum ps 18/298 Which of the following choices should the analyst look at first?
A recent zero-day vulnerability is being actively exploited, requires no user interaction or privilege escalation, and has a significant impact to confidentiality and integrity but not to availability. Which of the following CVE metrics would be most accurate for this zero -day threat?