A security specialist notices 100 HTTP GET and POST requests for multiple pages on the web servers. The agent in the requests contains PHP code that, if executed, creates and writes to a new PHP file on the webserver. Which event category is described?
Answer : D
What specific type of analysis is assigning values to the scenario to see expected outcomes?
Answer : A
When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?
Answer : C
Why is encryption challenging to security monitoring?
Answer : B
An employee reports that someone has logged into their system and made unapproved changes, files are out of order, and several documents have been placed in the recycle bin. The security specialist reviewed the system logs, found nothing suspicious, and was not able to determine what occurred. The software is up to date; there are no alerts from antivirus and no failed login attempts. What is causing the lack of data visibility needed to detect the attack?
Answer : B
A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within
48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?
Answer : C
What is the relationship between a vulnerability and a threat?
Answer : A
What is the principle of defense-in-depth?
Answer : B
DRAG DROP -
Drag and drop the uses on the left onto the type of security system on the right.
Select and Place:
Answer :
What is the difference between the rule-based detection when compared to behavioral detection?
Answer : B
A security incident occurred with the potential of impacting business services. Who performs the attack?
Answer : A
Reference:
https://www.paubox.com/blog/what-is-threat-actor/#:~:text=The%20term%20threat%20actor%20refers,CTA)%20when%20referencing%
20cybersecurity%20issues
How does a certificate authority impact security?
Answer : D
Reference:
https://en.wikipedia.org/wiki/Certificate_authority
Which data type is necessary to get information about source/destination ports?
Answer : B
Which event is a vishing attack?
Answer : C
Reference:
https://www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html#~types-of-phishing-attacks
DRAG DROP -
Drag and drop the security concept from the left onto the example of that concept on the right.
Select and Place:
Answer :
Have any questions or issues ? Please dont hesitate to contact us