Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?

A.

ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

B.

ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methods

C.

ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods

D.

ClientHello, ClientKeyExchange, cipher-suites it supports, and suggested compression methods

According to CVSS, what is attack complexity?

A.

existing exploits available in the wild exploiting the vulnerability

B.

existing circumstances beyond the attacker's control to exploit the vulnerability

C.

number of actions an attacker should perform to exploit the vulnerability

D.

number of patches available for certain attack mitigation and how complex the workarounds are

What does this regular expression do?

192|172).(168|1[6-9]|2[0-9]|3[0-1]).[0-9]{1,3}.[0-9]{1,3}\b

A.

It searches for private IP addresses except 10.0.0.0/8 IP address range.

B.

It matches any IP addresses within 172.16.0.0/16 IP address range.

C.

It searches for lines with private IP addresses in text.

D.

It extracts lines with 192.168.0.0/16 IP address range from the text.

Which are two denial-of-service attacks? (Choose two.)

A.

TCP connections

B.

ping of death

C.

man-in-the-middle

D.

code-red

E.

UDP flooding

Which SOC metric represents the time to stop the incident from causing further damage to systems or data?

A.

Mean Time to Acknowledge (MTTA)

B.

Mean Time to Detect (MTTR)

C.

Mean Time to Respond (MTTR)

D.

Mean Time to Contain (MTTC)

What is the benefit of processing statistical data for security systems?

A.

detects suspicious behavior based on traffic baselining trends

B.

uses less CPU and RAM resources than metadata-based monitoring

C.

provides fewer false negative events than full packet capture

D.

provides full visibility based on capture of packet traffic data

Refer to the exhibit.

Which kind of attack method is depicted in this string?

A.

cross-site scripting

B.

man-in-the-middle

C.

SQL injection

D.

denial of service

Refer to the exhibit. Which alert is identified from this packet?

A.

SYN flood

B.

SSDP amplification

C.

Fraggle attack

D.

TCP fragmentation attack

What is a difference between signature-based and behavior-based detection?

A.

Signature-based identifies behaviors that may be linked to attacks, while behavior-based has a predefined set of rules to match before an alert.

B.

Behavior-based identifies behaviors that may be linked to attacks, while signature-based has a predefined set of rules to match before an alert.

C.

Behavior-based uses a known vulnerability database, while signature-based intelligently summarizes existing data.

D.

Signature-based uses a known vulnerability database, while behavior-based intelligently summarizes existing data.

A network engineer noticed in the NetFlow report that internal hosts are sending many DNS requests to external DNS servers A SOC analyst checked the endpoints and discovered that they are infected and became part of the botnet Endpoints are sending multiple DNS requests but with spoofed IP addresses of valid external sources What kind of attack are infected endpoints involved in1?

A.

DNS hijacking

B.

DNS tunneling

C.

DNS flooding

D.

DNS amplification