Multiple Choice
A security analyst has received information from a third-party intelligence-sharing resource that indicates employee accounts were breached. Which of the following is the NEXT step the analyst should take to address the issue?
A) Audit access permissions for all employees to ensure least privilege.
B) Force a password reset for the impacted employees and revoke any tokens.
C) Configure SSO to prevent passwords from going outside the local network.
D) Set up privileged access management to ensure auditing is enabled.
Correct Answer:

Verified
Correct Answer:
Verified
Q37: Which of the following sets of attributes
Q38: A security analyst is reviewing the following
Q39: A company is moving from the use
Q40: An analyst is reviewing the following code
Q41: A security technician is testing a solution
Q43: An incident responder successfully acquired application binaries
Q44: A security analyst needs to reduce the
Q45: A security analyst at a technology solutions
Q46: A security analyst is required to stay
Q47: During an incident, a cybersecurity analyst found