DRAG DROP -
Drag and drop the threat from the left onto the scenario that introduces the threat on the right. Not all options are used.
Select and Place:
Answer :
Answer : B
The incident response team was notified of detected malware. The team identified the infected hosts, removed the malware, restored the functionality and data of infected systems, and planned a company meeting to improve the incident handling capability. Which step was missed according to the NIST incident handling guide?
Answer : D
Answer : A
Reference:
https://www.ccexpert.us/pix-firewall/ip-verify-reversepath-command.html
Answer : C
What do 2xx HTTP response codes indicate for REST APIs?
Answer : D
Reference:
https://restfulapi.net/http-status-codes/#:~:text=HTTP%20defines%20these%20standard%20status,results%20of%20a%20client%27s%
20request.&text=2xx%3A%20Success%20ג€"%20Indicates%20that%20the,order%20to%20complete%20their%20request
.
An engineer received an alert of a zero-day vulnerability affecting desktop phones through which an attacker sends a crafted packet to a device, resets the credentials, makes the device unavailable, and allows a default administrator account login. Which step should an engineer take after receiving this alert?
Answer : C
Answer : C
An engineer receives an incident ticket with hundreds of intrusion alerts that require investigation. An analysis of the incident log shows that the alerts are from trusted IP addresses and internal devices. The final incident report stated that these alerts were false positives and that no intrusions were detected. What action should be taken to harden the network?
Answer : C
A SOC team is informed that a UK-based user will be traveling between three countries over the next 60 days. Having the names of the 3 destination countries and the user's working hours, what must the analyst do next to detect an abnormal behavior?
Answer : D
An engineer receives a report that indicates a possible incident of a malicious insider sending company information to outside parties. What is the first action the engineer must take to determine whether an incident has occurred?
Answer : C
An employee abused PowerShell commands and script interpreters, which lead to an indicator of compromise (IOC) trigger. The IOC event shows that a known malicious file has been executed, and there is an increased likelihood of a breach. Which indicator generated this IOC event?
Answer : D
Refer to the exhibit. Which command was executed in PowerShell to generate this log?
Answer : A
Reference:
https://lists.xymon.com/archive/2019-March/046125.html
Answer : B
A security architect is working in a processing center and must implement a DLP solution to detect and prevent any type of copy and paste attempts of sensitive data within unapproved applications and removable devices. Which technical architecture must be used?
Answer : C
Reference:
https://www.endpointprotector.com/blog/what-is-data-loss-prevention-dlp/
Have any questions or issues ? Please dont hesitate to contact us