Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer ALL the questions carefully. Thanks 29- A network administrator has noticed a large amount of unknown traffic from several systems on the network

Please answer ALL the questions carefully. Thanks

image text in transcribed

29- A network administrator has noticed a large amount of unknown traffic from several systems on the network traveling to two external locations. Up on investigating the distention of the traffic, it is determined that the external locations include an international bank's website and a command and control server identified by several antivirus companies. Which of the following malware types is MOST likely responsible for this behavior? A) polymorphic B) botnet C) spyware D) Ransomware 30- A security technician is assisting with a post -incident response and is asked to participate in several sessions to review the incident. Which of the following should the organization review to help improve this process? A) Lessons learned B) Reporting C) Chain of custody document D) Recovery procedures 31- Despite layered defenses in security, company metrics indicate at least four to five incidents occur each quarter. A review of the security controls indicates that each functioning properly. Training in in which of the following would work BEST to help decrease the number of the security incidents? A) Incident reporting B) Security awareness C) Role-based D) Legal and compliance 32- Separations of duties is consider which of the following control types? A) Responsive B) Technical C) Management D) Physical 33- A company has just completed its third department reorganization this year. Many groups has completely different responsibilities than they had before, and a large number of employees have switch the roles. The security administrator is concerned about who can retrieve which files. Which of the following security controls could be implemented to BEST mitigate this issue? A) Continuous monitoring B) User access review C) Group-based privilege D) Credential management

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Upgrading Oracle Databases Oracle Database New Features

Authors: Charles Kim, Gary Gordhamer, Sean Scott

1st Edition

B0BL12WFP6, 979-8359657501

More Books

Students also viewed these Databases questions

Question

LO1 Summarize the organizations strategic planning process.

Answered: 1 week ago