Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

An employee has been terminated for policy violations.Security logs from win-webserver01 have been collectedand located in the Investigations folder on theDesktop as win-webserver01_logs.zip.

Generate a SHA256 digest of the System-logs.evtx filewithin the win-webserver01_logs.zip file and providethe output below.

Full Access
Question # 5

Your enterprise has received an alert bulletin fromnational authorities that the network has beencompromised at approximately 11:00 PM (Absolute) onAugust 19, 2024. The alert is located in the alerts folderwith filename, alert_33.pdf.

What is the name of the suspected malicious filecaptured by keyword process.executable at 11:04 PM?

Full Access
Question # 6

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the targets within the file pcap_artifact5.txt.

Select the correct decoded targets below.

10cal.com/exam

clOud-s3cure.com

c0c0nutf4rms.net

h3avy_s3as.biz

b4ddata.org

Full Access
Question # 7

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which of the following domain name(s) from the CCOAThreat Bulletin.pdf was contacted between 12:10 AMto 12:12 AM (Absolute) on August 17, 2024?

Full Access
Question # 8

Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.

What is the physical address of the web server that wastargeted with malicious PowerShell commands?

Full Access
Question # 9

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

Based on the contents of the malscript.viruz.txt, whichthreat actor group is the malware associated with?

Full Access
Question # 10

Following a ransomware incident, the network teamprovided a PCAP file, titled ransom.pcap, located in theInvestigations folder on the Desktop.

What is the name of the file containing the ransomwaredemand? Your response must include the fileextension.

Full Access
Question # 11

Which of (he following is the PRIMARY reason to regularly review firewall rules?

A.

To identify and remove rules that are no longer needed

B.

To identify and allow blocked traffic that should be permitted

C.

To ensure the rules remain in the correct order

D.

To correct mistakes made by other firewall administrators

Full Access
Question # 12

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What date was the webshell accessed? Enter the formatas YYYY-MM-DD.

Full Access
Question # 13

Which of the following is the PRIMARY purpose for an organization to adopt a cybersecurityframework?

A.

To ensure compliance with specific regulations

B.

To automate cybersecurity processes and reduce the need for human intervention

C.

To provide a standardized approach to cybetsecurity risk management

D.

To guarantee protection against possible cyber threats

Full Access
Question # 14

An attacker has exploited an e-commerce website by injecting arbitrary syntax that was passed to and executed by the underlying operating system. Which of the following tactics did the attacker MOST likely use?

A.

Command injection

B.

Injection

C.

Lightweight Directory Access Protocol (LDAP) Injection

D.

Insecure direct object reference

Full Access
Question # 15

Which of the following is MOST helpful to significantly reduce application risk throughout the system development life cycle (SOLC)?

A.

Security by design approach

B.

Security through obscurity approach

C.

Peer code reviews

D.

Extensive penetration testing

Full Access
Question # 16

Which of the following BEST describes privilege escalation in the context of kernel security?

A.

A process by which an attacker gains unauthorized access to user data

B.

A security vulnerability in the operating system that triggers buffer overflows

C.

A type of code to inject malware into the kernel

D.

A technique used by attackers to bypass kernel-level security controls

Full Access
Question # 17

Which of the following is MOST likely to result from a poorly enforced bring your own device (8YOD) policy?

A.

Weak passwords

B.

Network congestion

C.

Shadow IT

D.

Unapproved social media posts

Full Access
Question # 18

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many logs are associated with well knownunencrypted web traffic for the month of December2023 (Absolute)? Note: Security Onion refers to logsas documents.

Full Access
Question # 19

An organization uses containerization for its business application deployments, and all containers run on the same host, so they MUST share the same:

A.

user data.

B.

database.

C.

operating system.

D.

application.

Full Access
Question # 20

The network team has provided a PCAP file withsuspicious activity located in the Investigations folderon the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control thehost 10.10.44.200? Your response must include the fileextension.

Full Access
Question # 21

Which of the following is the PRIMARY benefit of implementing logical access controls on a need-to-know basis?

A.

Limiting access to sensitive data and resources

B.

Ensuring users can access all resources on the network

C.

Providing a consistent user experience across different applications

D.

Reducing the complexity of access control policies and procedures

Full Access
Question # 22

The enterprise is reviewing its security posture byreviewing unencrypted web traffic in the SIEM.

How many unique IPs have received well knownunencrypted web connections from the beginning of2022 to the end of 2023 (Absolute)?

Full Access
Question # 23

Which of the following is the BEST way for an organization to balance cybersecurity risks and address compliance requirements?

A.

Accept that compliance requirements may conflict with business needs and operate in a diminished capacity to achieve compliance.

B.

Meet the minimum standards for the compliance requirements to ensure minimal impact to business operations,

C.

Evaluate compliance requirements in thecontext at business objectives to ensure requirements can be implemented appropriately.

D.

Implement only the compliance requirements that do not Impede business functions or affect cybersecurity risk.

Full Access
Question # 24

Which of the following is a security feature provided by the WS-Security extension in the Simple Object Access Protocol (SOAP)?

A.

Transport Layer Security (TLS)

B.

Message confidentiality

C.

MaIware protection

D.

Session management

Full Access
Question # 25

Which of the following is MOST important for maintaining an effective risk management program?

A.

Approved budget

B.

Automated reporting

C.

Monitoring regulations

D.

Ongoing review

Full Access
Question # 26

Which of the following is the PRIMARY benefit of a cybersecurity risk management program?

A.

Identification of data protection processes

B.

Reduction of compliance requirements

C.

Alignment with Industry standards

D.

implementation of effective controls

Full Access
Question # 27

Which of the following network topologies is MOST resilient to network failures and can prevent a single point of failure?

A.

Mesh

B.

Star

C.

Bus

D.

Ring

Full Access
Question # 28

Which of the following should be considered FIRST when determining how to protect an organization's information assets?

A.

A prioritized Inventory of IT assets

B.

The organization's business model

C.

Results of vulnerability assessments

D.

The organization's risk reporting

Full Access
Question # 29

The Platform as a Service (PaaS) model is often used to support which of the following?

A.

Efficient application development and management

B.

Local on-premise management of products and services

C.

Subscription-based pay peruse applications

D.

Control over physical equipment running application developed In-house

Full Access
Question # 30

Which of the following is the PRIMARY risk associated with cybercriminals eavesdropping on unencrypted network traffic?

A.

Data notification

B.

Data exfiltration

C.

Data exposure

D.

Data deletion

Full Access
Question # 31

The user of the Accounting workstation reported thattheir calculator repeatedly opens without their input.

Perform a query of startup items for the agent.nameaccounting-pc in the SIEM for the last 24 hours. Identifythe file name that triggered RuleName SuspiciousPowerShell. Enter your response below. Your responsemust include the file extension.

Full Access
Question # 32

On the Analyst Desktop is a Malware Samples folderwith a file titled Malscript.viruz.txt.

What is the name of the service that the malware attempts to install?

Full Access
Question # 33

Which of the following should occur FIRST during the vulnerability identification phase?

A.

Inform relevant stakeholders that vulnerability scanning will be taking place.

B.

Run vulnerability scans of all in-scope assets.

C.

Determine the categories of vulnerabilities possible for the type of asset being tested.

D.

Assess the risks associated with the vulnerabilities Identified.

Full Access
Question # 34

How can port security protect systems on a segmented network?

A.

By enforcing encryption of data on the network

B.

By preventing unauthorized access to the network

C.

By establishing a Transport Layer Security (TLS) handshake

D.

By requiring multi-factor authentication

Full Access
Question # 35

Which of the following cyber crime tactics involves targets being contacted via text message by an attacker posing as a legitimate entity?

A.

Hacking

B.

Vishing

C.

Smishing

D.

Cyberstalking

Full Access
Question # 36

Question 1 and 2

You have been provided with authentication logs toinvestigate a potential incident. The file is titledwebserver-auth-logs.txt and located in theInvestigations folder on the Desktop.

Which IP address is performing a brute force attack?

What is the total number of successful authenticationsby the IP address performing the brute force attack?

Full Access
Question # 37

The CISO has received a bulletin from law enforcementauthorities warning that the enterprise may be at risk ofattack from a specific threat actor. Review the bulletin

named CCOA Threat Bulletin.pdf on the Desktop.

Which host IP was targeted during the following timeframe: 11:39 PM to 11:43 PM (Absolute) on August 16,2024?

Full Access
Question # 38

Analyze the file titled pcap_artifact5.txt on the AnalystDesktop.

Decode the C2 host of the attack. Enter your responsebelow.

Full Access
Question # 39

For this question you must log into GreenboneVulnerability Manager using Firefox. The URL is:https://10.10.55.4:9392 and credentials are:

Username:admin

Password:Secure-gvm!

A colleague performed a vulnerability scan but did notreview prior to leaving for a family emergency. It hasbeen determined that a threat actor is using CVE-2021-22145 in the wild. What is the host IP of the machinethat is vulnerable to this CVE?

Full Access
Question # 40

Which of the following is the PRIMARY benefit of using software-defined networking for network security?

A.

It simplifies network topology and reduces complexity.

B.

It provides greater scalability and flexibility for network devices.

C.

It allows for centralized security management and control.

D.

It Improves security monitoring and alerting capabilities.

Full Access
Question # 41

Which of the following is the MOST common output of a vulnerability assessment?

A.

A list of identified vulnerabilities along with a severity level for each

B.

A detailed report on the overall vulnerability posture, including physical security measures

C.

A list of potential attackers along with their IP addresses and geolocation data

D.

A list of authorized users and their access levels for each system and application

Full Access