The safer , easier way to help you pass any IT exams.program and assign the function to the security team. Which of the following frameworks would BEST support the program? (Select Two) 20/ 27
27.A cybersecurity analyst has received an alert that well-known "call home" messages are continuously observed by network sensors at the network boundary. The proxy firewall successfully drops the messages. After determining the alert was a true positive, which of the following represents the MOST likely cause?
28.A company has implemented WPA2, a 20-character minimum for the WIFI passphrase, and a new WiFi passphrase every 30 days, and has disabled SSID broadcast on all wireless access points. Which of the following is the company trying to mitigate? A. Downgrade attacks B. Rainbow tables C. SSL pinning D. Forced deauthentication Answer:D
29.The help desk formed a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analyst has determined the email includes an attachment named invoice.zip that contains the following files: Locky.jp xerty.ini xerty.lib Further analysis indicates that when the zip file Is opened, it is installing a new version of ransomware on the devices. Which of the following should be done FIRST to prevent data on the company NAS from being encrypted by infected devices?