4.0 Security Operations Assessment questions
with answers
A global corporation has faced numerous cyber threats
and is now prioritizing the security of its servers. The
corporation's IT security expert recommends a strategy to
improve server security. Which of the following options is
likely to be the MOST effective? - CORRECT ANSWERS
✔✔D. Implement a secure baseline, consistently apply
updates and patches, and adhere to hardening
guidelines.
A software engineer is reviewing the various capabilities
of automation and scripting. What capability does the use
of security groups allow for in automation and scripting? -
CORRECT ANSWERS ✔✔A. It assists in reducing the
possibility of unauthorized access or excessive
permissions.
As a company matures, its attack surface also grows.
Additionally, the company becomes an increasingly
desirable target for a malicious actor to compromise its
systems. A company must monitor all software usage,
secure applications, third-party software, libraries, and
, dependencies. Which of the following would contribute to
protecting the business's operations? (Select the three
best options.) - CORRECT ANSWERS ✔✔A. Package
monitoring
B. Software Bill of Materials
C. Software composition analysis
A forensic analyst at an international law enforcement
agency investigates a sophisticated cyber-espionage
case. The analyst must uncover the timeline of document
interactions, detect concealed or system-protected files,
interpret categories of digital events, and trace digital
breadcrumbs left behind during media uploads on social
platforms. What combination of data sources would
provide the MOST comprehensive information for this
multifaceted investigation? - CORRECT ANSWERS ✔✔C.
File metadata with extended attributes and network
transaction logs
The IT team of a medium-sized business is planning to
enhance network security. They want to enforce minimum
security controls and configurations across all network
devices, including firewalls, routers, and switches. What
should they establish to achieve this objective? -
CORRECT ANSWERS ✔✔A. Network security baselines