Questions and Answers
.A chief security officer (CSO) is overseeing the deployment of a Security Information and Event Management
(SIEM) system in a large organization with a mix of computer systems and network appliances. The CSO has
concerns about the system resources that the data collection process on the individual computer systems
utilizes. Which method should the CSO consider to minimize the resource usage on these systems while
ensuring effective data collection for the SIEM system? - ANSWER-C. Implementing an agentless collection
method on the computer systems
.A company has added several new assets and software to its system and is meeting to review its risk matrix. It
wants to ensure risk management efforts focus on vulnerabilities most likely impacting its operations
significantly. What is this commonly referred to as? - ANSWER-A. Prioritization
.A company merged with another company and is reviewing and combining both companies' procedures for
incident response. What should the joined companies have at the end of this preparation phase? - ANSWER-C.
Incident response plan
.A company plans to upgrade its wireless network infrastructure to improve connectivity and security. The IT
team wants to ensure that the new network design provides adequate coverage, minimizes interference, and
meets security standards. To achieve this, they conduct a site survey and create a heat map of the area. What
is the primary purpose of conducting a site survey and creating a heat map for the company's wireless network
upgrade? - ANSWER-D. To assess wireless signal coverage, identify dead zones, and optimize access point
placement for the upgrade
.A company recently faced a security breach through its network switch. They learned that the attacker was
able to access the switch using the default credentials. Which of the following steps should the company take
to improve the security of the switch and avoid such breaches in the future? - ANSWER-C. Change the default
credentials of the switch
.A company's network has experienced increased infiltration due to employees accessing dangerous websites
from different content categories. The company has decided to enhance its security by implementing
reputation-based filtering and content categorization in its web filtering system. Which of the following BEST
compares these features? - ANSWER-C. Reputation-based filtering evaluates sites by past behavior; content
categorization sorts by themes like adult content.
, .A cyber architect explores various methods to assist in not having to manually pull data to support IT
operations. What are the benefits associated with user provisioning? (Select the two best options.) - ANSWER-
A. It can create, modify, or delete individual user accounts.
B. It can create, modify, or delete individual users' access rights across IT systems.
.A cyber group is reviewing its web filtering capabilities after a recent breach. Which centralized web-filtering
technique groups websites into categories such as social networking, gambling, and webmail? - ANSWER-B.
Content categorization
.A cyber team is responding to regulatory requirements after the organization falls victim to a breach. What
remediation practice involves the application of updates to systems to fix known vulnerabilities? - ANSWER-B.
Patching
.A cyber technician is enhancing application security capabilities for corporate email accounts following a
breach. Which of the following options leverages encryption features to enable email verification by allowing
the sender to sign emails using a digital signature? - ANSWER-B. DKIM
.A cyber technician pulls logs on the new Apple iMacs to ensure the company's employees adhere to the policy.
What log can provide the technician with the computer's attempted logins or denial when an employee
attempts to access a file? - ANSWER-B. Operating system-specific security logs
.A cybersecurity manager is preparing to begin working when a police officer comes through the door waving a
warrant. The officer states that the company is under investigation for suspicious activities relating to recent
overseas sales, and they are taking the servers with them. What gives police officers the right to take the
servers? - ANSWER-A. Data acquisition (incorrect)
B. Due process (incorrect)
.A cybersecurity responder surreptitiously monitors the activities of a hacker attempting infiltration. During this
time, the cybersecurity responder prepared a containment and eradication plan. This is an example of what
type of threat hunting technique? - ANSWER-B. Maneuvering
.A digital forensics analyst at a healthcare company is investigating a case involving a potential internal data
breach. The breach has led to unauthorized access and potential exposure of sensitive patient information. The