A security analyst reviews a SIEM alert related to a suspicious email and wants to verify the authenticity of the message:
SPF = PASS
DKIM = FAIL
DMARC = FAIL
Which of the following did the analyst most likely discover?
Comprehensive and Detailed Step-by-Step The SPF = PASS result confirms the email came from an authorized server, but DKIM = FAIL indicates the message was not properly signed with the expected DomainKeys Identified Mail (DKIM) signature. DMARC = FAIL suggests that because DKIM failed, the overall email authentication failed. This scenario is consistent with a legitimate server sending an unsigned email.
CompTIA CySA+ All-in-One Guide (Chapter 5: Email Analysis)
CompTIA CySA+ Practice Tests (Domain 1.3 Email Authentication)
A security analyst wants to implement new monitoring controls in order to find abnormal account activity for traveling employees. Which of the following techniques would deliver the expected results?
User behavior analysis (UBA) is the most effective method for detecting abnormal account activity.
UBA uses machine learning and behavioral analytics to identify patterns in how users interact with systems. If an employee suddenly logs in from an unusual location or accesses resources outside of their normal behavior, it raises an alert.
Option A (Malicious command interpretation) is focused on malware analysis, not user behavior.
Option B (Network monitoring) detects anomalies at the network level, but does not specifically focus on user behaviors.
Option D (SSL Inspection) is useful for decrypting encrypted traffic, but it does not analyze user activity patterns.
A SOC receives several alerts indicating user accounts are connecting to the company's identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?
Intrusion Detection Systems (IDS) logs provide visibility into network traffic patterns and can help detect insecure or unusual connections. These logs will show if non-secure protocols are used, potentially revealing exposed credentials. According to CompTIA CySA+, IDS logs are essential for identifying malicious activity related to communications and network intrusions. Options like DNS (A) and tcpdump (B) provide network details, but IDS specifically monitors for intrusions and unusual activities relevant to security incidents.
An organization is planning to adopt a zero-trust architecture. Which of the following is most aligned with this approach?
Comprehensive and Detailed Step-by-Step
Network segmentation supports zero-trust principles by ensuring sensitive systems are isolated and access is restricted based on identity, role, and context. Unlike traditional models, zero-trust architecture does not automatically trust authenticated users or internal network traffic. It enforces strict access controls to minimize risk.
CompTIA CySA+ Study Guide (Chapter 2: Zero Trust and Network Segmentation, Page 52)
CompTIA CySA+ Objectives (Domain 1.1 - Zero Trust Architecture)
Which of the following responsibilities does the legal team have during an incident management event? (Select two).
The legal team plays a crucial role in managing the legal and compliance aspects of incident response. They review and approve contracts (B) for emergency services, like incident response firms, and provide guidance on regulatory reporting (C), ensuring the organization meets compliance requirements. According to CompTIA Security+ guidelines, legal teams focus on regulatory and contractual matters rather than operational aspects like staffing (A) or security procedures (D).
Domitila
6 days agoJamal
14 days agoVivan
28 days agoMartina
1 months agoWerner
1 months agoLynelle
2 months agoMichal
2 months agoDesiree
2 months agoAnnamae
2 months agoValda
3 months agoMarshall
3 months agoKatheryn
3 months agoStanford
3 months agoLaurel
4 months agoPortia
4 months agoErin
4 months agoTamala
4 months agoEdison
4 months agoJohnetta
5 months agoCletus
5 months agoTheodora
5 months agoCora
5 months agoWillow
6 months agoRikki
6 months agoMelissa
6 months agoLavonna
6 months agoDerrick
6 months agoCristen
7 months agoHillary
7 months agoCasie
7 months agoArmando
7 months agoAshanti
8 months agoAileen
9 months agoAlberto
9 months agoNovella
10 months agoCarlee
10 months agoCristen
10 months agoBrandon
10 months agofelvaa
10 months agoalexa
10 months agoNathon
10 months agomelvin
10 months agoMark james
10 months agoAmmie
11 months ago