Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two attacks are denial-of-service (DoS) attacks? (Choose two.)

A.

UDP flooding

B.

Code Red

C.

man-in-the-middle

D.

ping of death

E.

TCP connections

Which technology assures that the information transferred from point A to point B is unaltered and authentic?

A.

Subject Alternative Name

B.

Trust anchor

C.

Digital certificates

D.

EMV signatures

An engineer received an alert affecting the degraded performance of a critical server. Analysis showed a heavy CPU and memory load. What is the next step the engineer should take to investigate this resource usage?

A.

Run "ps -d" to decrease the priority state of high load processes to avoid resource exhaustion.

B.

Run "ps -u" to find out who executed additional processes that caused a high load on a server.

C.

Run "ps -ef" to understand which processes are taking a high amount of resources.

D.

Run "ps -m" to capture the existing state of daemons and map required processes to find the gap.

Which two elements are assets in the role of attribution in an investigation? (Choose two.)

A.

context

B.

session

C.

laptop

D.

firewall logs

E.

threat actor

Which two measures are used by the defense-m-depth strategy? (Choose two)

A.

Bridge the single connection into multiple.

B.

Divide the network into parts

C.

Split packets into pieces.

D.

Reduce the load on network devices.

E.

Implement the patch management process

Refer to the exhibit.

A suspicious IP address is tagged by Threat Intelligence as a brute-force attempt source After the attacker produces many of failed login entries, it successfully compromises the account. Which stakeholder is responsible for the incident response detection step?

A.

employee 5

B.

employee 3

C.

employee 4

D.

employee 2

Which attack method intercepts traffic on a switched network?

A.

denial of service

B.

ARP cache poisoning

C.

DHCP snooping

D.

command and control

Refer to the exhibit.

Which frame numbers contain a file that is extractable via TCP stream within Wireshark?

A.

7,14, and 21

B.

7 and 21

C.

14,16,18, and 19

D.

7 to 21

Refer to the exhibit.

During the analysis of a suspicious scanning activity incident, an analyst discovered multiple local TCP connection events Which technology provided these logs?

A.

antivirus

B.

proxy

C.

IDS/IPS

D.

firewall

An engineer is sharing folders and files with different departments and got this error: "No such file or directory". What must the engineer verify next?

A.

memory allocation

B.

symlinks

C.

permission

D.

disk space