D-SF-A-24 Exam Question 1

During the analysis, the threat intelligence team disclosed that attackers not only encrypted files, but also attempted to encrypt backups and shared, networked, and cloud drives.
Which type of ransomware is used for this attack?
  • D-SF-A-24 Exam Question 2

    The cybersecurity team performed a quantitative risk analysis onA .R.T.I.E.'s IT systems during the risk management process.
    What is the focus of a quantitative risk analysis?
  • D-SF-A-24 Exam Question 3

    AR.T.I.E.'s business is forecast to grow tremendously in the next year, the organization will not only need to hire new employees but also requires contracting with third-party vendors to continue seamless operations.A
    .R.T.I.E.uses a VPN to support its employees on the corporate network, but the organization is facing a security challenge in supporting the third-party business vendors.
    To better meetA .R.T.I.E.'s security needs, the cybersecurity team suggested adopting a Zero Trust architecture (ZTA). The main aim was to move defenses from static, network-based perimeters to focus on users, assets, and resources. Zero Trust continuously ensures that a user is authentic and the request for resources is also valid. ZTA also helps to secure the attack surface while supporting vendor access.
    What is the main challenge that ZTA addresses?
  • D-SF-A-24 Exam Question 4

    In the cloud, there are numerous configuration options for the services provided. If not properly set, these configurations can leave the environment in an unsecure state where an attacker can read and modify the transmitted data packets and send their own requests to the client.
    Which types of attack enable an attacker to read and modify the transmitted data packets and send their own requests to the client?
  • D-SF-A-24 Exam Question 5

    During the analysis, the threat intelligence team disclosed a possible threat which went unnoticed when anA
    .R.T.I.E.employee sent their friend a slide deck containing the personal information of a colleague. The exposed information included employee first and last names, date of birth and employee ID.
    What kind of attack occurred?