Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which statement describes indicators of attack?

A.

internal hosts communicate with countries outside of the business range.

B.

Phishing attempts on an organization are blocked by mall AV.

C.

Critical patches are missing.

D.

A malicious file is detected by the AV software.

Refer to the exhibit.

Which attack is being attempted against a web application?

A.

SQL injection

B.

man-in-the-middle

C.

command injection

D.

denial of service

What is the role of indicator of compromise in an investigation?

A.

It helps answer the question of why the attack took place.

B.

It identifies potentially malicious activity on a system or network.

C.

It is nonforensic data, which is easy to detect.

D.

It describes what and why something happened.

Drag and drop the definition from the left onto the phase on the right to classify intrusion events according to the Cyber Kill Chain model.

What is the virtual address space for a Windows process?

A.

physical location of an object in memory

B.

set of pages that reside in the physical memory

C.

system-level memory protection feature built into the operating system

D.

set of virtual memory addresses that can be used

What is a collection of compromised machines that attackers use to carry out a DDoS attack?

A.

subnet

B.

botnet

C.

VLAN

D.

command and control

What is the difference between statistical detection and rule-based detection models?

A.

Rule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time

B.

Statistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis

C.

Statistical detection involves the evaluation of an object on its intended actions before it executes that behavior

D.

Rule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis

A security specialist is investigating an incident regarding a recent major breach in the organization. The accounting data from a 24-month period is affected due to a trojan detected in a department's critical server. A security analyst investigates the incident and discovers that an incident response team member who detected a trojan during regular AV scans had made an image of the server for evidence purposes. The security analyst made animage again to compare the hashes of the two images, and they appeared to differ and do not match. Which type of evidence is the security analyst dealing with?

A.

checksum violated image

B.

integrity violated image

C.

untampered image

D.

tampered image

An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?

A.

X.509 certificates

B.

RADIUS server

C.

CA server

D.

web application firewall

What are indicators of attack?

A.

large numbers of requests for the same file

B.

multiple tog ins from different regions

C.

swells in database read volume

D.

suspicious registry or system file changes