CS0-002 Exam Question 106

As part of the senior leadership team's ongoing nsk management activities the Chief Information Security Officer has tasked a security analyst with coordinating the right training and testing methodology to respond to new business initiatives or significant changes to existing ones The management team wants to examine a new business process that would use existing infrastructure to process and store sensitive data Which of the following would be appropnate for the security analyst to coordinate?
  • CS0-002 Exam Question 107

    A company just chose a global software company based in Europe to implement a new supply chain management solution. Which of the following would be the MAIN concern of the company?
  • CS0-002 Exam Question 108

    A security analyst is correlating, ranking, and enriching raw data into a report that will be interpreted by humans or machines to draw conclusions and create actionable recommendations Which of the following steps in the intelligence cycle is the security analyst performing?
  • CS0-002 Exam Question 109

    An information security analyst on a threat-hunting team Is working with administrators to create a hypothesis related to an internally developed web application The working hypothesis is as follows:
    * Due to the nature of the industry, the application hosts sensitive data associated with many clients and Is a significant target.
    * The platform Is most likely vulnerable to poor patching and Inadequate server hardening, which expose vulnerable services.
    * The application is likely to be targeted with SQL injection attacks due to the large number of reporting capabilities within the application.
    As a result, the systems administrator upgrades outdated service applications and validates the endpoint configuration against an industry benchmark. The analyst suggests developers receive additional training on implementing identity and access management, and also implements a WAF to protect against SQL injection attacks Which of the following BEST represents the technique in use?
  • CS0-002 Exam Question 110

    During an investigation, a security analyst determines suspicious activity occurred during the night shift over the weekend. Further investigation reveals the activity was initiated from an internal IP going to an external website.
    Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in the future?