Which category classifies the intrusion?

A user received a malicious attachment but did not run it. Which category classifies the intrusion?A . weaponizationB . reconnaissanceC . installationD . deliveryView AnswerAnswer: D

February 15, 2024No CommentsREAD MORE +

Which obfuscation technique is the attacker using?

An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication. Which obfuscation technique is the attacker using?A . Base64 encodingB...

February 14, 2024No CommentsREAD MORE +

What is an attack surface as compared to a vulnerability?

What is an attack surface as compared to a vulnerability?A . any potential danger to an assetB . the sum of all paths for data into and out of the environmentC . an exploitable weakness in a system or its designD . the individuals who perform an attackView AnswerAnswer: B...

February 14, 2024No CommentsREAD MORE +

Which piece of information is needed to search for additional downloads of this file by other hosts?

Refer to the exhibit. A malicious file has been identified in a sandbox analysis tool. Which piece of information is needed to search for additional downloads of this file by other hosts?A . file header typeB . file sizeC . file nameD . file hash valueView AnswerAnswer: D

February 14, 2024No CommentsREAD MORE +

Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?

Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?A . decision makingB . rapid responseC . data miningD . due diligenceView AnswerAnswer: B

February 14, 2024No CommentsREAD MORE +

Which action prevents buffer overflow attacks?

Which action prevents buffer overflow attacks?A . variable randomizationB . using web based applicationsC . input sanitizationD . using a Linux operating systemView AnswerAnswer: C

February 14, 2024No CommentsREAD MORE +

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?A . ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methodsB . ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methodsC . ClientHello, TLS versions it supports, cipher-suites...

February 13, 2024No CommentsREAD MORE +

What is the practice of giving an employee access to only the resources needed to accomplish their job?

What is the practice of giving an employee access to only the resources needed to accomplish their job?A . principle of least privilegeB . organizational separationC . separation of dutiesD . need to know principleView AnswerAnswer: A

February 13, 2024No CommentsREAD MORE +

What is the virtual address space for a Windows process?

What is the virtual address space for a Windows process?A . physical location of an object in memoryB . set of pages that reside in the physical memoryC . system-level memory protection feature built into the operating systemD . set of virtual memory addresses that can be usedView AnswerAnswer: D

February 13, 2024No CommentsREAD MORE +

Which security principle requires more than one person is required to perform a critical task?

Which security principle requires more than one person is required to perform a critical task?A . least privilegeB . need to knowC . separation of dutiesD . due diligenceView AnswerAnswer: C

February 13, 2024No CommentsREAD MORE +