Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A security analyst has discovered that an application has failed to run. Which of the following is the tool MOST

likely used by the analyst for the initial discovery?

A.

syslog

B.

MSConfig

C.

Event Viewer

D.

Process Monitor

Tcpdump is a tool that can be used to detect which of the following indicators of compromise?

A.

Unusual network traffic

B.

Unknown open ports

C.

Poor network performance

D.

Unknown use of protocols

Which of the following is the GREATEST risk of having security information and event management (SIEM) collect computer names with older log entries?

A.

There may be duplicate computer names on the network.

B.

The computer name may not be admissible evidence in court.

C.

Domain Name System (DNS) records may have changed since the log was created.

D.

There may be field name duplication when combining log files.

A company help desk is flooded with calls regarding systems experiencing slow performance and certain Internet sites taking a long time to load or not loading at all. The security operations center (SOC) analysts who receive these calls take the following actions:

-Running antivirus scans on the affected user machines

-Checking department membership of affected users

-Checking the host-based intrusion prevention system (HIPS) console for affected user machine alerts

-Checking network monitoring tools for anomalous activities

Which of the following phases of the incident response process match the actions taken?

A.

Identification

B.

Preparation

C.

Recovery

D.

Containment

Which term best describes an asset's susceptibility to damage or loss due to a threat?

A.

Exposure

B.

Attack

C.

Breach

D.

Threat

Which of the following methods are used by attackers to find new ransomware victims? (Choose two.)

A.

Web crawling

B.

Distributed denial of service (DDoS) attack

C.

Password guessing

D.

Phishing

E.

Brute force attack

Which of the following backup strategies will result in the shortest backup time during weekdays and use the least amount of storage space but incur the longest restore time?

A.

Full weekly backup with daily differential backups.

B.

Mirror backups on a daily basis.

C.

Full backups on a daily basis.

D.

Full weekly backup with daily incremental backups.

Which common source of vulnerability should be addressed to BEST mitigate against URL redirection attacks?

A.

Application

B.

Users

C.

Network infrastructure

D.

Configuration files

According to SANS, when should an incident retrospective be performed?

A.

After law enforcement has identified the perpetrators of the attack.

B.

Within six months following the end of the incident.

C.

No later than two weeks from the end of the incident.

D.

Immediately concluding eradication of the root cause

What term means that data is valid and not corrupt?

A.

Confidentiality

B.

Authorization

C.

Integrity

D.

Authentication