Which action does the engineer recommend?

A company encountered a breach on its web servers using IIS 7 5 Dunng the investigation, an engineer discovered that an attacker read and altered the data on a secure communication using TLS 1 2 and intercepted sensitive information by downgrading a connection to export-grade cryptography. The engineer must mitigate...

February 24, 2022 No Comments READ MORE +

What does cyber attribution identify in an investigation?

What does cyber attribution identify in an investigation?A . cause of an attackB . exploit of an attackC . vulnerabilities exploitedD . threat actors of an attackView AnswerAnswer: D Explanation: https://www.techtarget.com/searchsecurity/definition/cyber-attribution

February 24, 2022 No Comments READ MORE +

What is a difference between inline traffic interrogation and traffic mirroring?

What is a difference between inline traffic interrogation and traffic mirroring?A . Inline inspection acts on the original traffic data flowB . Traffic mirroring passes live traffic to a tool for blockingC . Traffic mirroring inspects live traffic for analysis and mitigationD . Inline traffic copies packets for analysis and...

February 23, 2022 No Comments READ MORE +

Which data type is necessary to get information about source/destination ports?

Which data type is necessary to get information about source/destination ports?A . statistical dataB . session dataC . connectivity dataD . alert dataView AnswerAnswer: B Explanation: Session data provides information about the five tuples; source IP address/port number, destination IP address/port number and the protocol What is Connectivity Data? According...

February 23, 2022 No Comments READ MORE +

What information is depicted?

Refer to the exhibit. What information is depicted?A . IIS dataB . NetFlow dataC . network discovery eventD . IPS event dataView AnswerAnswer: B

February 23, 2022 No Comments READ MORE +

What is a difference between an inline and a tap mode traffic monitoring?

What is a difference between an inline and a tap mode traffic monitoring?A . Inline monitors traffic without examining other devices, while a tap mode tags traffic and examines the data from monitoring devices.B . Tap mode monitors traffic direction, while inline mode keeps packet data as it passes through...

February 23, 2022 No Comments READ MORE +

What describes the defense-m-depth principle?

What describes the defense-m-depth principle?A . defining precise guidelines for new workstation installationsB . categorizing critical assets within the organizationC . isolating guest Wi-Fi from the focal networkD . implementing alerts for unexpected asset malfunctionsView AnswerAnswer: B

February 22, 2022 No Comments READ MORE +

What is the reason for this discrepancy?

An analyst received an alert on their desktop computer showing that an attack was successful on the host. After investigating, the analyst discovered that no mitigation action occurred during the attack . What is the reason for this discrepancy?A . The computer has a HIPS installed on it.B . The...

February 22, 2022 No Comments READ MORE +

Which packet contains a file that is extractable within Wireshark?

Refer to the exhibit. Which packet contains a file that is extractable within Wireshark?A . 2317B . 1986C . 2318D . 2542View AnswerAnswer: D

February 22, 2022 No Comments READ MORE +

What is occurring in this network traffic?

Refer to the exhibit. What is occurring in this network traffic?A . High rate of SYN packets being sent from a multiple source towards a single destination IC . High rate of ACK packets being sent from a single source IP towards multiple destination IPs.D . Flood of ACK packets...

February 22, 2022 1 Comment READ MORE +