Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An incident response analyst is preparing to scan memory using a YARA rule. How is this task completed?

A.

deobfuscation

B.

XML injection

C.

string matching

D.

data diddling

Refer to the exhibit.

Which type of code is being used?

A.

Shell

B.

VBScript

C.

BASH

D.

Python

What are two features of Cisco Secure Endpoint? (Choose two.)

A.

file trajectory

B.

rogue wireless detection

C.

Orbital Advanced Search

D.

web content filtering

E.

full disk encryption

Refer to the exhibit.

Which two actions should be taken as a result of this information? (Choose two.)

A.

Update the AV to block any file with hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

B.

Block all emails sent from an @state.gov address.

C.

Block all emails with pdf attachments.

D.

Block emails sent from Admin@state.net with an attached pdf file with md5 hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

E.

Block all emails with subject containing “cf2b3ad32a8a4cfb05e9dfc45875bd70”.

An organization experienced a sophisticated phishing attack that resulted in the compromise of confidential information from thousands of user accounts. The threat actor used a land and expand approach, where initially accessed account was used to spread emails further. The organization's cybersecurity team must conduct an in-depth root cause analysis to uncover the central factor or factors responsible for the success of the phishing attack. The very first victim of the attack was user with email 500236186@test.com. The primary objective is to formulate effective strategies for preventing similar incidents in the future. What should the cybersecurity engineer prioritize in the root cause analysis report to demonstrate the underlying cause of the incident?

A.

investigation into the specific vulnerabilities or weaknesses in the organization's email security systems that were exploited by the attackers

B.

evaluation of the organization's incident response procedures and the performance of the incident response team

C.

examination of the organization's network traffic logs to identify patterns of unusual behavior leading up to the attack

D.

comprehensive analysis of the initial user for presence of an insider who gained monetary value by allowing the attack to happen

Which tool should be used for dynamic malware analysis?

A.

Decompiler

B.

Unpacker

C.

Disassembler

D.

Sandbox

What are YARA rules based upon?

A.

binary patterns

B.

HTML code

C.

network artifacts

D.

IP addresses

Which technique exemplifies an antiforensic technique?

A.

steganalysis

B.

data replication

C.

stepheorology

D.

steganography

A security team needs to prevent a remote code execution vulnerability. The vulnerability can be exploited only by sending '${ string in the HTTP request. WAF rule is blocking '${', but system engineers detect that attackers are executing commands on the host anyway. Which action should the security team recommend?

A.

Enable URL decoding on WAF.

B.

Block incoming web traffic.

C.

Add two WAF rules to block 'S' and '{' characters separately.

D.

Deploy antimalware solution.