Podcast
Questions and Answers
Which of the following should the analyst recommend be updated first to meet the security requirements and reduce risks?
Which of the following should the analyst recommend be updated first to meet the security requirements and reduce risks?
Which of the following CVE metrics would be most accurate for this zero-day threat?
Which of the following CVE metrics would be most accurate for this zero-day threat?
Which of the following communication plans should the CEO initiate following the compromise of a confidential trade secret?
Which of the following communication plans should the CEO initiate following the compromise of a confidential trade secret?
Which piece of data should be collected first to preserve sensitive information before isolating the server?
Which piece of data should be collected first to preserve sensitive information before isolating the server?
Signup and view all the answers
Study Notes
Security Requirements and Recommendations
- A company has strict security requirements: no public IPs, all data secured at rest, and no insecure ports/protocols.
- A security analyst needs to address misconfigurations reported by a cloud scanner.
- VM_PRD_Web01 should be updated first due to having a public IP and open port 80, violating security policies.
- The recommendation for VM_PRD_Web01 includes changing to a private IP and closing port 80 or using HTTPS.
Zero-Day Vulnerability Metrics
- A zero-day vulnerability is being actively exploited, requiring no user interaction and significantly affecting confidentiality and integrity but not availability.
- CVSS (Common Vulnerability Scoring System) metrics for this threat are:
- AV: N (Network),
- AC: L (Low),
- PR: N (None),
- UI: N (None),
- S: U (Unchanged),
- C: H (High),
- I: H (High),
- A: L (Low).
- The chosen option for the CVSS metrics accurately describes the vulnerability scenario.
Communication Plans for Data Compromise
- In response to a confidential trade secret compromise, the CEO should direct department managers to have private discussions with affected staff.
- It's crucial to maintain confidentiality and avoid public disclosure of sensitive information.
- Verification of legal notification requirements regarding personally identifiable information (PII) and sensitive personal information (SPII) is also essential.
Incident Response and Evidence Collection
- An incident response team secures Indicators of Compromise (IoCs) found on a critical server.
- The first step is to collect the hard disk for preservation of sensitive information.
- The hard disk contains all data and files, making it critical for further investigation before isolating the server.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers essential cybersecurity protocols and metrics, including security requirements for cloud configurations and understanding zero-day vulnerabilities. Test your knowledge on common vulnerability scoring systems (CVSS) and their implications for security policies.