Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In a secure government communication network, an automated alert indicates the presence of anomalous DLL files injected into the system memory during a routine update of communication protocols. These DLL files are exhibiting beaconing behavior to a satellite IP known for signal interception risks. Concurrently, there is an uptick in encrypted traffic volumes that suggests possible data exfiltration. Which set of actions should the security engineer prioritize?

A.

Invoke a classified incident response scenario, notify national defense cyber operatives, and begin containment and eradication procedures on affected systems.

B.

Conduct memory forensics to analyze the suspicious DLL files, disrupt the beaconing sequence, and assess the encrypted traffic for breach indicators.

C.

Activate a secure emergency communication channel, isolate the segments of the communication network, and initiate a threat hunting operation for further anomalies.

D.

Sever connections to the satellite IP, execute a rollback of the recent protocol updates, and engage counter-intelligence cybersecurity measures.

A company had a recent data leak incident. A security engineer investigating the incident discovered that a malicious link was accessed by multiple employees. Further investigation revealed targeted phishing attack attempts on macOS systems, which led to backdoor installations and data compromise. Which two security solutions should a security engineer recommend to mitigate similar attacks in the future? (Choose two.)

A.

endpoint detection and response

B.

secure email gateway

C.

data loss prevention

D.

intrusion prevention system

E.

web application firewall

Refer to the exhibit.

An alert came with a potentially suspicious activity from a machine in HR department. Which two IOCs should the security analyst flag? (Choose two.)

A.

powershell.exe used on HR machine

B.

cmd.exe executing from \Device\HarddiskVolume3\

C.

WScript.exe initiated by powershell.exe

D.

cmd.exe starting powershell.exe with Base64 conversion

E.

WScript.exe acting as a parent of cmd.exe

Refer to the exhibit.

An engineer received a ticket to analyze a recent breach on a company blog. Every time users visit the blog, they are greeted with a message box. The blog allows users to register, log in, create, and provide comments on various topics. Due to the legacy build of the application, it stores user information in the outdated MySQL database. What is the recommended action that an engineer should take?

A.

Validate input on arrival as strictly as possible.

B.

Implement TLS 1.3 for external communications.

C.

Match the web server software for the front-end and back-end servers.

D.

Upgrade the MySQL database.

Refer to the exhibit.

A company that uses only the Unix platform implemented an intrusion detection system. After the initial configuration, the number of alerts is overwhelming, and an engineer needs to analyze and classify the alerts. The highest number of alerts were generated from the signature shown in the exhibit. Which classification should the engineer assign to this event?

A.

True Negative alert

B.

False Negative alert

C.

False Positive alert

D.

True Positive alert

An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment, which was an empty Word document. The engineer cannot identify any clear signs of compromise but while reviewing running processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. What is the recommended action the engineer should take?

A.

Upload the file signature to threat intelligence tools to determine if the file is malicious.

B.

Monitor processes as this is standard behavior of Word macro embedded documents.

C.

Contain the threat for further analysis as this is an indication of suspicious activity.

D.

Investigate the sender of the email and communicate with the employee to determine the motives.

Refer to the exhibit.

What is the IOC threat and URL in this STIX JSON snippet?

A.

malware; ‘http://x4z9arb.cn/4712/’

B.

malware; x4z9arb backdoor

C.

x4z9arb backdoor; http://x4z9arb.cn/4712/

D.

malware; malware--162d917e-766f-4611-b5d6-652791454fca

E.

stix; ‘http://x4z9arb.cn/4712/’

A.

VBScript

B.

Python

C.

Bash

D.

shell

Refer to the exhibit.

An employee notices unexpected changes and setting modifications on their workstation and creates an incident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket was escalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumps on network shares. What should be determined from this information?

A.

data obfuscation

B.

reconnaissance attack

C.

brute-force attack

D.

log tampering

Refer to the exhibit.

Which determination should be made by a security analyst?

A.

An email was sent with an attachment named “Grades.doc.exe”.

B.

An email was sent with an attachment named “Grades.doc”.

C.

An email was sent with an attachment named “Final Report.doc”.

D.

An email was sent with an attachment named “Final Report.doc.exe”.