Which option can be addressed when using retrospective security techniques?
Answer : B
What is accomplished in the identification phase of incident handling?
Answer : D
Explanation:
In the identification phase you need to work out whether you are dealing with an event or an incident. This is where understanding your environment is critical as it means looking for significant deviations from "normal" traffic baselines or other methods.
Which network device creates and sends the initial packet of a session?
Answer : A
Answer : A
From a security perspective, why is it important to employ a clock synchronization protocol on a network?
Answer : C
Which CVSSv3 Attack Vector metric value requires the attacker to physically touch or manipulate the vulnerable component?
Answer : B
Reference:
https://www.first.org/cvss/specification-document
DRAG DROP -
Drag and drop the elements of incident handling from the left into the correct order on the right.
Select and Place:
Answer :
Reference:
https://countuponsecurity.com/2012/12/21/computer-security-incident-handling-6-steps/
Answer : D
Which option creates a display filter on Wireshark on a host IP address or name?
Answer : D
You see confidential data being exfiltrated to an IP address that is attributed to a known Advanced Persistent Threat group. Assume that this is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Diamond Model of Intrusion?
Answer : C
Refer to the exhibit.
Answer : A
DRAG DROP -
Answer :
Which option filters a LibPCAP capture that used a host as a gateway?
Answer : D
Reference:
https://www.wireshark.org/docs/wsug_html_chunked/ChCapCaptureFilterSection.html
Which identifies both the source and destination location?
Answer : A
Which description of a retrospective malware detection is true?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us