What is the state of this file?

Refer to the exhibit. An engineer is analyzing this Cuckoo Sandbox report for a PDF file that has been downloaded from an email. What is the state of this file?A . The file has an embedded executable and was matched by PEiD threat signatures for further analysis.B . The file...

February 18, 2024No CommentsREAD MORE +

What type of evidence is this file?

An investigator is examining a copy of an ISO file that is stored in CDFS format. What type of evidence is this file?A . data from a CD copied using Mac-based systemB . data from a CD copied using Linux systemC . data from a DVD copied using Windows systemD...

February 18, 2024No CommentsREAD MORE +

Which two pieces of information from the analysis report are needed to investigate the callouts?

An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)A . signaturesB . host IP addressesC ....

February 18, 2024No CommentsREAD MORE +

What are the two characteristics of the full packet captures? (Choose two.)

What are the two characteristics of the full packet captures? (Choose two.)A . Identifying network loops and collision domains.B . Troubleshooting the cause of security and performance issues.C . Reassembling fragmented traffic from raw data.D . Detecting common hardware faults and identify faulty assets.E . Providing a historical record of...

February 18, 2024No CommentsREAD MORE +

What is the impact of this traffic?

An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?A . ransomware communicating after infectionB . users downloading copyrighted contentC . data exfiltrationD . user circumvention of the firewallView AnswerAnswer: D

February 18, 2024No CommentsREAD MORE +

What is rule-based detection when compared to statistical detection?

What is rule-based detection when compared to statistical detection?A . proof of a user's identityB . proof of a user's actionC . likelihood of user's actionD . falsification of a user's identityView AnswerAnswer: B

February 18, 2024No CommentsREAD MORE +

What are two social engineering techniques? (Choose two.)

What are two social engineering techniques? (Choose two.)A . privilege escalationB . DDoS attackC . phishingD . man-in-the-middleE . pharmingView AnswerAnswer: CE

February 17, 2024No CommentsREAD MORE +

Which event is user interaction?

Which event is user interaction?A . gaining root accessB . executing remote codeC . reading and writing file permissionD . opening a malicious fileView AnswerAnswer: D

February 17, 2024No CommentsREAD MORE +

What is an example of social engineering attacks?

What is an example of social engineering attacks?A . receiving an unexpected email from an unknown person with an attachment from someone in the same companyB . receiving an email from human resources requesting a visit to their secure website to update contact informationC . sending a verbal request to...

February 17, 2024No CommentsREAD MORE +

How does an SSL certificate impact security between the client and the server?

How does an SSL certificate impact security between the client and the server?A . by enabling an authenticated channel between the client and the serverB . by creating an integrated channel between the client and the serverC . by enabling an authorized channel between the client and the serverD ....

February 17, 2024No CommentsREAD MORE +