Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

Exam contains 56 questions

Page 9 of 10
Question 49 🔥

A security team received reports of users receiving emails linked to external or unknown URLs that are non-returnable and non-deliverable. The ISP also reported a 500% increase in the amount of ingress and egress email traffic received. After detecting the problem, the security team moves to the recovery phase in their incident response plan. Which two actions should be taken in the recovery phase of this incident? (Choose two.)

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 50 🔥

An organization uses a Windows 7 workstation for access tracking in one of their physical data centers on which a guard documents entrance/exit activities of all personnel. A server shut down unexpectedly in this data center, and a security specialist is analyzing the case. Initial checks show that the previous two days of entrance/exit logs are missing, and the guard is confident that the logs were entered on the workstation. Where should the security specialist look next to continue investigating this case?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 51 🔥

An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment, which was an empty Word document.The engineer cannot identify any clear signs of compromise but while reviewing running processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. What is the recommended action the engineer should take?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 52 🔥

An engineer is analyzing a ticket for an unexpected server shutdown and discovers that the web-server ran out of useable memory and crashed.Which data is needed for further investigation?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 53 🔥

Refer to the exhibit. An employee notices unexpected changes and setting modifications on their workstation and creates an incident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket was escalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumps on network shares. What should be determined from this information?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 54 🔥

Refer to the exhibit. A company that uses only the Unix platform implemented an intrusion detection system. After the initial configuration, the number of alerts is overwhelming, and an engineer needs to analyze and classify the alerts. The highest number of alerts were generated from the signature shown in the exhibit.Which classification should the engineer assign to this event?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

© 2024 Exam Prepare, Inc. All Rights Reserved.