DRAG DROP
Drag and drop the phases to evaluate the security posture of an asset from the left onto the activity
that happens during the phases on the right.

According to GDPR, what should be done with data to ensure its confidentiality, integrity, and
availability?
B
Reference:
https://apdcat.gencat.cat/web/.content/03-documentacio/
Reglament_general_de_proteccio_de_dades/documents/DPIA-Guide.pdf
A payroll administrator noticed unexpected changes within a piece of software and reported the
incident to the incident response team. Which actions should be taken at this step in the incident
response workflow?
B
A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20
of its hosted applications. Based on the audit, which recommendation should an engineer make for
patching?
D
An engineer is analyzing a possible compromise that happened a week ago when the company ?
(Choose two.)
AB
A European-based advertisement company collects tracking information from partner websites and
stores it on a local server to provide tailored ads. Which standard must the company follow to
safeguard the resting data?
D
Reference:
https://www.thesslstore.com/blog/10-data-privacy-and-encryption-laws-every-business-
needs-to
- know/
An organization had a breach due to a phishing attack. An engineer leads a team through the
recovery phase of the incident response process. Which action should be taken during this phase?
C
An engineer is going through vulnerability triage with company management because of a recent
malware outbreak from which 21 affected assets need to be patched or remediated. Management
decides not to prioritize fixing the assets and accepts the vulnerabilities. What is the next step the
engineer should take?
D
The incident response team receives information about the abnormal behavior of a host. A malicious
file is found being executed from an external USB flash drive. The team collects and documents all
the necessary evidence from the computing resource. What is the next step?
B
DRAG DROP
An engineer notices that unauthorized software was installed on the network and discovers that it
was installed by a dormant user account. The engineer suspects an escalation of privilege attack and
responds to the incident. Drag and drop the activities from the left into the order for the response on
the right.
