Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A cybersecurity analyst must identify an unknown service causing high CPU on a Windows server. What tool should be used?

A.

Volatility to analyze memory dumps for forensic investigation

B.

Process Explorer from the Sysinternals Suite to monitor and examine active processes

C.

TCPdump to capture and analyze network packets

D.

SIFT (SANS Investigative Forensic Toolkit) for comprehensive digital forensics

An insider scattered multiple USB flash drives with zero-day malware in a company HQ building. Many employees connected the USB flash drives to their workstations. An attacker was able to get access to endpoints from outside, steal user credentials, and exfiltrate confidential information from internal web resources. Which two steps prevent these types of security incidents in the future? (Choose two.)

A.

Automate security alerts on connected USB flash drives to workstations.

B.

Provide security awareness training and block usage of external drives.

C.

Deploy antivirus software on employee workstations to detect malicious software.

D.

Encrypt traffic from employee workstations to internal web services.

E.

Deploy MFA authentication to prevent unauthorized access to critical assets.

Refer to the exhibit.

What is occurring?

A.

The request was redirected.

B.

WAF detected code injection.

C.

An attacker attempted SQL injection.

D.

The requested page was not found.

A threat actor has successfully attacked an organization and gained access to confidential files on a laptop. What plan should the organization initiate to contain the attack and prevent it from spreading to other network devices?

A.

root cause

B.

intrusion prevention

C.

incident response

D.

attack surface

Refer to the exhibit.

Which two determinations should be made about the attack from the Apache access logs? (Choose two.)

A.

The attacker used r57 exploit to elevate their privilege.

B.

The attacker uploaded the WordPress file manager trojan.

C.

The attacker performed a brute force attack against WordPress and used SQL injection against the backend database.

D.

The attacker used the WordPress file manager plugin to upload r57.php.

E.

The attacker logged on normally to WordPress admin page.

Refer to the exhibit.

A cybersecurity analyst is presented with the snippet of code used by the threat actor and left behind during the latest incident and is asked to determine its type based on its structure and functionality. What is the type of code being examined?

A.

simple client-side script for downloading other elements

B.

basic web crawler for indexing website content

C.

network monitoring script for capturing incoming traffic

D.

socket programming listener for TCP/IP communication

A cybersecurity analyst detects fileless malware activity on secure endpoints. What should be done next?

A.

Immediately quarantine the endpoints containing the suspicious files and consider the issue resolved

B.

Isolate the affected endpoints and conduct a detailed memory analysis to identify fileless malware execution.

C.

Delete the suspicious files and monitor the endpoints for any further signs of compromise.

D.

Share the findings with other government agencies for collaborative threat analysis and response.

Refer to the exhibit. A security analyst notices that a web application running on NGINX is generating an unusual number of log messages. The application is operational and reachable. What is the cause of this activity?

A.

botnet infection

B.

directory fuzzing

C.

DDoS attack

D.

SQL injection

Refer to the exhibit.

The application x-dosexec with hash 691c65e4fb1d19f82465df1d34ad51aaeceba14a78167262dc7b2840a6a6aa87 is reported as malicious and labeled as "Trojan.Generic" by the threat intelligence tool. What is considered an indicator of compromise?

A.

modified registry

B.

hooking

C.

process injection

D.

data compression

Which issue is associated with gathering evidence from virtualized environments provided by major cloud vendors?

A.

increased data transparency provided by cloud vendors

B.

difficulty ensuring the integrity of data due to multitenancy

C.

reduced complexity in isolating and securing evidence

D.

simplified chain of custody due to virtualization