Multiple Choice
A security analyst is building a malware analysis lab. The analyst wants to ensure malicious applications are not capable of escaping the virtual machines and pivoting to other networks. To BEST mitigate this risk, the analyst should use __________.
A) an 802.11ac wireless bridge to create an air gap.
B) a managed switch to segment the lab into a separate VLAN.
C) a firewall to isolate the lab network from all other networks.
D) an unmanaged switch to segment the environments from one another.
Correct Answer:

Verified
Correct Answer:
Verified
Q5: Which of the following secure coding techniques
Q6: A security analyst implemented a solution that
Q7: An information security analyst is reviewing backup
Q8: A user receives a potentially malicious email
Q9: A development team uses open-source software and
Q11: A company's incident response team is handling
Q12: Which of the following is the MOST
Q13: A company wants to establish a threat-hunting
Q14: An organization used a third party to
Q15: A security analyst is reviewing the following