A recent penetration test discovered that several employees were enticed to assist attackers by visiting specific websites and running downloaded files when prompted by phone calls. Which of the following would best address this issue?
Increasing training and awareness for all staff is the best way to address the issue of employees being enticed to assist attackers by visiting specific websites and running downloaded files when prompted by phone calls. This issue is an example of social engineering, which is a technique that exploits human psychology and behavior to manipulate people into performing actions or divulging information that benefit the attackers. Social engineering can take many forms, such as phishing, vishing, baiting, quid pro quo, or impersonation. The best defense against social engineering is to educate and train the staff on how to recognize and avoid common social engineering tactics, such as:
Verifying the identity and legitimacy of the caller or sender before following their instructions or clicking on any links or attachments
Being wary of unsolicited or unexpected requests for information or action, especially if they involve urgency, pressure, or threats
Reporting any suspicious or anomalous activity to the security team or the appropriate authority
Following the organization's policies and procedures on security awareness and best practices
Official Reference:
https://partners.comptia.org/docs/default-source/resources/comptia-cysa-cs0-002-exam-objectives
https://www.comptia.org/certifications/cybersecurity-analyst
https://www.comptia.org/blog/the-new-comptia-cybersecurity-analyst-your-questions-answered
A payroll department employee was the target of a phishing attack in which an attacker impersonated a department director and requested that direct deposit information be updated to a new account. Afterward, a deposit was made into the unauthorized account. Which of the following is one of the first actions the incident response team should take when they receive notification of the attack?
In case of a phishing attack, it's crucial to review what actions were taken by the employee and analyze the phishing email to understand its nature and impact.Reference:CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition, Chapter 6, page 246;CompTIA CySA+ CS0-003 Certification Study Guide, Chapter 6, page 255.
A company has the following security requirements:
. No public IPs
* All data secured at rest
. No insecure ports/protocols
After a cloud scan is completed, a security analyst receives reports that several misconfigurations are putting the company at risk. Given the following cloud scanner output:
Which of the following should the analyst recommend be updated first to meet the security requirements and reduce risks?
This VM has a public IP and an open port 80, which violates the company's security requirements of no public IPs and no insecure ports/protocols. It also exposes the VM to potential attacks from the internet. This VM should be updated first to use a private IP and close the port 80, or use a secure protocol such as HTTPS.
Reference[CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition], Chapter 2: Cloud and Hybrid Environments, page 67.[What is a Public IP Address?][What is Port 80?]
A cybersecurity analyst notices unusual network scanning activity coming from a country that the company does not do business with. Which of the following is the best mitigation technique?
Geoblocking is the best mitigation technique for unusual network scanning activity coming from a country that the company does not do business with, as it can prevent any potential attacks or data breaches from that country. Geoblocking is the practice of restricting access to websites or services based on geographic location, usually by blocking IP addresses associated with a certain country or region. Geoblocking can help reduce the overall attack surface and protect against malicious actors who may be trying to exploit vulnerabilities or steal information. The other options are not as effective as geoblocking, as they may not block all the possible sources of the scanning activity, or they may not address the root cause of the problem. Official Reference:
https://www.blumira.com/geoblocking/
https://www.avg.com/en/signal/geo-blocking
Which of the following is a benefit of the Diamond Model of Intrusion Analysis?
The Diamond Model of Intrusion Analysis is a framework that helps analysts to understand the relationships between the adversary, the victim, the infrastructure, and the capability involved in an attack. It also enables analytical pivoting, which is the process of moving from one piece of information to another related one, and identifies knowledge gaps that need further investigation.
Arthur
29 days agoMa
1 months agoLashon
1 months agoSamira
2 months agoJoanna
2 months agoDelfina
3 months agoBilli
4 months agoRex
4 months agoKris
4 months agoDomitila
5 months agoJamal
5 months agoVivan
5 months agoMartina
6 months agoWerner
6 months agoLynelle
6 months agoMichal
7 months agoDesiree
7 months agoAnnamae
7 months agoValda
7 months agoMarshall
8 months agoKatheryn
8 months agoStanford
8 months agoLaurel
8 months agoPortia
8 months agoErin
9 months agoTamala
9 months agoEdison
9 months agoJohnetta
9 months agoCletus
9 months agoTheodora
10 months agoCora
10 months agoWillow
10 months agoRikki
10 months agoMelissa
10 months agoLavonna
11 months agoDerrick
11 months agoCristen
11 months agoHillary
11 months agoCasie
11 months agoArmando
12 months agoAshanti
1 years agoAileen
1 years agoAlberto
1 years agoNovella
1 years agoCarlee
1 years agoCristen
1 years agoBrandon
1 years agofelvaa
1 years agoalexa
1 years agoNathon
1 years agomelvin
1 years agoMark james
1 years agoAmmie
1 years ago