Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Drag and drop the security concept from the left onto the example of that concept on the right.

In a SOC environment, what is a vulnerability management metric?

A.

code signing enforcement

B.

full assets scan

C.

internet exposed devices

D.

single factor authentication

What is the purpose of command and control for network-aware malware?

A.

It contacts a remote server for commands and updates

B.

It takes over the user account for analysis

C.

It controls and shuts down services on the infected host.

D.

It helps the malware to profile the host

Which statement describes patch management?

A.

scanning servers and workstations for missing patches and vulnerabilities

B.

managing and keeping previous patches lists documented for audit purposes

C.

process of appropriate distribution of system or software updates

D.

workflow of distributing mitigations of newly found vulnerabilities

According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?

A.

malware attack

B.

ransomware attack

C.

whale-phishing

D.

insider threat

Which action matches the weaponization step of the Cyber Kill Chain Model?

A.

Develop a specific malware to exploit a vulnerable server, i

B.

Match a known script to a vulnerability.

C.

Construct a trojan and deliver l! to the victim.

D.

Scan open services and ports on a server.

An analyst is using the SIEM platform and must extract a custom property from a Cisco device and capture the phrase, "File: Clean." Which regex must the analyst import?

A.

File: Clean

B.

^Parent File Clean$

C.

File: Clean (.*)

D.

^File: Clean$

Which utility blocks a host portscan?

A.

HIDS

B.

sandboxing

C.

host-based firewall

D.

antimalware

Drag and drop the security concept on the left onto the example of that concept on the right.

A cyberattacker notices a security flaw in a software that a company is using They decide to tailor a specific worm to exploit this flaw and extract saved passwords from the software To which category of the Cyber Kill Cham model does this event belong?

A.

reconnaissance

B.

delivery

C.

weaponization

D.

exploitation