Q: 1
A cybersecurity analyst is tasked with scanning a web application to understand where the scan will
go and whether there are URIs that should be denied access prior to more in-depth scanning. Which
of following best fits the type of scanning activity requested?
Options
Discussion
C or D for me, since both relate to more detailed scanning, and the question mentions going deeper after the initial scan. Nice clear wording here makes it easier to follow.
Be respectful. No spam.
Q: 2
Which of the following is the most important reason for an incident response team to develop a
formal incident declaration?
Options
Discussion
Honestly a bit confused here, but I think it's B. Seems like knowing who can actually declare an incident is key, right?
Be respectful. No spam.
Q: 3
Which of the following will most likely ensure that mission-critical services are available in the event
of an incident?
Options
Discussion
C. Question is super clear and matches what I've seen in similar practice sets.
Its C. Disaster recovery plan is built specifically to restore mission-critical services after an incident, so you’re actually ensuring availability. I remember a similar scenario from labs-BCP is broader, DRP is more about the actual restoration step. Pretty sure about this, but if someone's got a different read let me know.
Be respectful. No spam.
Q: 4
A security analyst reviews the latest vulnerability scans and observes there are vulnerabilities with
similar CVSSv3 scores but different base score metrics. Which of the following attack vectors should
the analyst remediate first?
Options
Discussion
Maybe B. AV:A seems like it could be exploited from the adjacent network, which is risky if you have a lot of flat segments. Unless I'm missing a catch in the wording.
Be respectful. No spam.
Q: 5
An incident response team is working with law enforcement to investigate an active web server
compromise. The decision has been made to keep the server running and to implement
compensating controls for a period of time. The web service must be accessible from the internet via
the reverse proxy and must connect to a database server. Which of the following compensating
controls will help contain the adversary while meeting the other requirements? (Select two).
Options
Discussion
B and F. Deploying EDR should help with detection, and moving the database onto the web server sounds like it could make containment easier (less attack surface spread). Not 100% though, maybe I'm missing a risk with F?
Be respectful. No spam.
Q: 6
During an incident, analysts need to rapidly investigate by the investigation and leadership teams.
Which of the following best describes how PII should be safeguarded during an incident?
Options
Discussion
B. Had something like this in a mock exam, and the combo of restricting team permissions plus encryption covers both technical and procedural controls. Limits who can access PII while also protecting data at rest. Pretty sure that's what they're going for here.
Be respectful. No spam.
Q: 7
Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a
malicious downloader to ensure it will not be detected by the victim organization's endpoint security
protections. Which of the following stages of the Cyber Kill Chain best aligns with the threat actor's
actions?
Options
Discussion
I don’t think it’s B. D matches closer since the attacker is actually building and testing their malware, not just gathering info. Recon is before this step. Pretty sure about D, but let me know if you see it differently.
Option B this sounds like Reconnaissance since they're gathering info from forums. Wouldn't weaponizing come after they actually have a payload ready?
Be respectful. No spam.
Q: 8
Which of the following risk management principles is accomplished by purchasing cyber insurance?
Options
Discussion
Not C, definitely D. Buying cyber insurance is all about transferring risk, not mitigating it directly.
D imo, had this exact question in my exam and it's definitely risk transfer.
Be respectful. No spam.
Q: 9
A security analyst needs to ensure that systems across the organization are protected based on the
sensitivity of the content each system hosts. The analyst is working with the respective system
owners to help determine the best methodology that seeks to promote confidentiality, availability,
and integrity of the data being hosted. Which of the following should the security analyst perform
first to
categorize and prioritize the respective systems?
Options
Discussion
D makes sense since you need a baseline for asset value before you can apply the right controls or prioritize. Can't really rank systems by sensitivity if you don't know their importance. Pretty sure that's the intent here but happy if someone thinks otherwise.
Maybe D but sometimes asset value gets weird when systems are shared by multiple departments. I've seen similar questions where you actually have to clarify ownership first, but here I think prioritizing by value matches the exam logic.
Depends if the question is asking for the best first step or just any good practice. If it's best first, then D.
Be respectful. No spam.
Q: 10
Which of the following is most appropriate to use with SOAR when the security team would like to
automate actions across different vendor platforms?
Options
Discussion
Its B
But does the question specify if the SOAR needs to pull data only, or actually trigger actions on those platforms? If it was just about collecting threat intel, could see A being valid too.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2