Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Drag and drop the steps from the left into the order to perform forensics analysis of infrastructure networks on the right.

What describes the first step in performing a forensic analysis of infrastructure network devices?

A.

immediately disconnecting the device from the network

B.

initiating an immediate full system scan

C.

resetting the device to factory settings and analyzing the difference

D.

producing an accurate, forensic-grade duplicate of the device's data

A.

Initiate a connection to 23.1.4.14 over port 8443.

B.

Generate a Windows executable file.

C.

Open the Mozilla Firefox browser.

D.

Validate the SSL certificate for 23.1.4.14.

A website administrator has an output of an FTP session that runs nightly to download and unzip files to a local staging server. The download includes thousands of files, and the manual process used to find how many files failed to download is time-consuming. The administrator is working on a PowerShell script that will parse a log file and summarize how many files were successfully downloaded versus ones that failed. Which script will read the contents of the file one line at a time and return a collection of objects?

A.

Get-Content-Folder \Server\FTPFolder\Logfiles\ftpfiles.log | Show-From “ERROR”, “SUCCESS”

B.

Get-Content –ifmatch \Server\FTPFolder\Logfiles\ftpfiles.log | Copy-Marked “ERROR”, “SUCCESS”

C.

Get-Content –Directory \Server\FTPFolder\Logfiles\ftpfiles.log | Export-Result “ERROR”, “SUCCESS”

D.

Get-Content –Path \Server\FTPFolder\Logfiles\ftpfiles.log | Select-String “ERROR”, “SUCCESS”

What is an antiforensic technique to cover a digital footprint?

A.

authorization

B.

obfuscation

C.

privilege escalation

D.

authentication

Drag and drop the capabilities on the left onto the Cisco security solutions on the right.

An incident response team is recommending changes after analyzing a recent compromise in which:

    a large number of events and logs were involved;

    team members were not able to identify the anomalous behavior and escalate it in a timely manner;

    several network systems were affected as a result of the latency in detection;

    security engineers were able to mitigate the threat and bring systems back to a stable state; and

    the issue reoccurred shortly after and systems became unstable again because the correct information was not gathered during the initial identification phase.

Which two recommendations should be made for improving the incident response process? (Choose two.)

A.

Formalize reporting requirements and responsibilities to update management and internal stakeholders throughout the incident-handling process effectively.

B.

Improve the mitigation phase to ensure causes can be quickly identified, and systems returned to a functioning state.

C.

Implement an automated operation to pull systems events/logs and bring them into an organizational context.

D.

Allocate additional resources for the containment phase to stabilize systems in a timely manner and reduce an attack’s breadth.

E.

Modify the incident handling playbook and checklist to ensure alignment and agreement on roles, responsibilities, and steps before an incident occurs.

An incident responder reviews a log entry that shows a Microsoft Word process initiating an outbound network connection followed by PowerShell execution with obfuscated commands. Considering the machine's role in a sensitive data department, what is the most critical action for the responder to take next to analyze this output for potential indicators of compromise?

A.

Compare the metadata of the Microsoft Word document with known templates to verify its authenticity.

B.

Examine the network destination of the outbound connection to assess the credibility and categorize the traffic.

C.

Conduct a behavioral analysis of the PowerShell execution pattern and deobfuscate the commands to assess malicious intent.

D.

Correlate the time of the outbound network connection with the user's activity log to establish a usage pattern.

Refer to the exhibit.

A web hosting company analyst is analyzing the latest traffic because there was a 20% spike in server CPU usage recently. After correlating the logs, the problem seems to be related to the bad actor activities. Which attack vector is used and what mitigation can the analyst suggest?

A.

SQL Injection; implement input validation and use parameterized queries.

B.

Distributed denial of service; use rate limiting and DDoS protection services.

C.

Phishing attack; conduct regular user training and use email filtering solutions.

D.

Brute-force attack; implement account lockout policies and roll out MFA.

A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?

A.

encryption

B.

tunneling

C.

obfuscation

D.

poisoning