SIMULATION
During the course of normal SOC operations, three anomalous events occurred and were flagged as potential IoCs. Evidence for each of these potential IoCs is provided.
INSTRUCTIONS
Review each of the events and select the appropriate analysis and remediation options for each IoC.
A. See the complete solution below in Explanation.
B. PlaceHolder
C. PlaceHolder
D. PlaceHolder
A security analyst is reviewing the following event timeline from an COR solution:
Which of the following most likely has occurred and needs to be fixed?
A. The Dl P has failed to block malicious exfiltration and data tagging is not being utilized property
B. An EDR bypass was utilized by a threat actor and updates must be installed by the administrator.
C. A logic law has introduced a TOCTOU vulnerability and must be addressed by the COR vendor
D. A potential insider threat is being investigated and will be addressed by the senior management team.
A security analyst is reviewing the following authentication logs: Which of the following should the analyst do first?
A. Disable User2's account
B. Disable User12's account
C. Disable User8's account
D. Disable User1's account
After remote desktop capabilities were deployed in the environment, various vulnerabilities were noticed.
1.
Exfiltration of intellectual property
2.
Unencrypted files
3.
Weak user passwords
Which of the following is the best way to mitigate these vulnerabilities? (Select two).
A. Implementing data loss prevention
B. Deploying file integrity monitoring
C. Restricting access to critical file services only
D. Deploying directory-based group policies
E. Enabling modem authentication that supports MFA
F. Implementing a version control system
G. Implementing a CMDB platform
Users are experiencing a variety of issues when trying to access corporate resources examples include
1.
Connectivity issues between local computers and file servers within branch offices
2.
Inability to download corporate applications on mobile endpoints wtiilc working remotely
3.
Certificate errors when accessing internal web applications
Which of the following actions are the most relevant when troubleshooting the reported issues? (Select two).
A. Review VPN throughput
B. Check IPS rules
C. Restore static content on lite CDN.
D. Enable secure authentication using NAC
E. Implement advanced WAF rules.
F. Validate MDM asset compliance
During a gap assessment, an organization notes that OYOD usage is a significant risk. The organization implemented administrative policies prohibiting BYOD usage However, the organization has not implemented technical controls to prevent the unauthorized use of BYOD assets when accessing the organization's resources.
Which of the following solutions should the organization implement to best reduce the risk of OYOD devices? (Select two).
A. Cloud 1AM to enforce the use of token based MFA
B. Conditional access, to enforce user-to-device binding
C. NAC, to enforce device configuration requirements
D. PAM. to enforce local password policies
E. SD-WAN. to enforce web content filtering through external proxies
F. DLP, to enforce data protection capabilities
An incident response team completed recovery from offline backup for several workstations. The workstations were subjected to a ransomware attack after users fell victim to a spear-phishing campaign, despite a robust training program. Which of the following questions should be considered during the lessons-learned phase to most likely reduce the risk of reoccurrence? (Choose two.)
A. Are there opportunities for legal recourse against the originators of the spear-phishing campaign?
B. What internal and external stakeholders need to be notified of the breach?
C. Which methods can be implemented to increase speed of offline backup recovery?
D. What measurable user behaviors were exhibited that contributed to the compromise?
E. Which technical controls, if implemented, would provide defense when user training fails?
F. Which user roles are most often targeted by spear phishing attacks?
A senior cybersecurity engineer is solving a digital certificate issue in which the CA denied certificate issuance due to failed subject identity validation. At which of the following steps within the PKI enrollment process would the denial have occurred?
A. RA
B. OCSP
C. CA
D. IdP
A security architect is reviewing the following organizational specifications for a new application:
1.
Be sessionless and API-based
2.
Accept uploaded documents with PII, so all storage must be ephemeral
3.
Be able to scale on-demand across multiple nodes
4.
Restrict all network access except for the TLS port
Which of the following ways should the architect recommend the application be deployed in order to meet security and organizational infrastructure requirements?
A. Utilizing the cloud container service
B. On server instances with autoscaling groups
C. Using scripted delivery
D. With a content delivery network
A Chief Information Security Officer (CISO) received a call from the Chief Executive Officer (CEO) about a data breach from the SOC lead around 9:00 a.m. At 10:00 a.m. The CEO informs the CISO that a breach of the firm is being reported on national news. Upon investigation, it is determined that a network administrator has reached out to a vendor prior to the breach for information on a security patch that failed to be installed. Which of the following should the CISO do to
prevent this from happening again?
A. Properly triage events based on brand imaging and ensure the CEO is on the call roster.
B. Create an effective communication plan and socialize it with all employees.
C. Send out a press release denying the breach until more information can be obtained.
D. Implement a more robust vulnerability identification process.