Based on the information in the case study, which security team should be the most suitable to perform root cause analysis of the attack and present the proposal to solve the challenges faced by the A .R.T.I.E. organization?
Answer : B
The cybersecurity team must create a resilient security plan to address threats. To accomplish this, the threat intelligence team performed a thorough analysis of the A .R.T.I.E. threat landscape. The result was a list of vulnerabilities such as social engineering, zero-day exploits, ransomware, phishing emails, outsourced infrastructure, and insider threats.
Using the information in the case study and the scenario for this question, which vulnerability type exposes the data and infrastructure of A.R.T.I.E .?
Answer : D
A Zero Trust security strategy is defined by which of the primary approaches?
Answer : D
A R.T.I.E.'s business is forecast to grow tremendously in the next year, the organization will not only need to hire new employees but also requires contracting with third-party vendors to continue seamless operations. A .R.T.I.E. uses a VPN to support its employees on the corporate network, but the organization is facing a security challenge in supporting the third-party business vendors.
To better meet A .R.T.I.E.'s security needs, the cybersecurity team suggested adopting a Zero Trust architecture (ZTA). The main aim was to move defenses from static, network-based perimeters to focus on users, assets, and resources. Zero Trust continuously ensures that a user is authentic and the request for resources is also valid. ZTA also helps to secure the attack surface while supporting vendor access.
What is the main challenge that ZTA addresses?
Answer : C
Implementing ZTA would address this challenge by:
Ensuring that all users, even those within the network perimeter, must be authenticated and authorized to access any corporate resources.
Providing continuous validation of the security posture of both the user and the device before granting access to resources.
During the analysis, the threat intelligence team disclosed that attackers not only encrypted files, but also attempted to encrypt backups and shared, networked, and cloud drives.
Which type of ransomware is used for this attack?
Answer : B
In the cloud, there are numerous configuration options for the services provided. If not properly set, these configurations can leave the environment in an unsecure state where an attacker can read and modify the transmitted data packets and send their own requests to the client.
Which types of attack enable an attacker to read and modify the transmitted data packets and send their own requests to the client?
Answer : C
Verified Answer: The type of attack that enables an attacker to read and modify the transmitted data packets and send their own requests to the client is:
C . TCP hijacking
During analysis, the Dell Services team found outdated applications and operating systems with missing security patches. To avert potential cyberattacks, Dell recommends application and operating system hardening measures.
Why is security hardening important for A.R.T.I.E .?
Answer : B