Which HTTP header field is used in forensics to identify the type of browser used?

Which HTTP header field is used in forensics to identify the type of browser used?A . referrerB . hostC . user-agentD . accept-languageView AnswerAnswer: C

September 20, 2021No CommentsREAD MORE +

Which action should be taken if the system is overwhelmed with alerts when false positives and false negatives are compared?

Which action should be taken if the system is overwhelmed with alerts when false positives and false negatives are compared?A . Modify the settings of the intrusion detection system.B . Design criteria for reviewing alerts.C . Redefine signature rules.D . Adjust the alerts schedule.View AnswerAnswer: A

September 19, 2021No CommentsREAD MORE +

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?

Which list identifies the information that the client sends to the server in the negotiation phase of the TLS handshake?A . ClientStart, ClientKeyExchange, cipher-suites it supports, and suggested compression methodsB . ClientStart, TLS versions it supports, cipher-suites it supports, and suggested compression methodsC . ClientHello, TLS versions it supports, cipher-suites...

September 19, 2021No CommentsREAD MORE +

Which information is available on the server certificate?

When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification. Which information is available on the server certificate?A . server name, trusted subordinate CA, and private keyB . trusted subordinate CA, public key, and cipher suitesC . trusted...

September 19, 2021No CommentsREAD MORE +

Which NIST IR category stakeholder is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies?

Which NIST IR category stakeholder is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies?A . CSIRTB . PSIRTC . public affairsD . managementView AnswerAnswer: D

September 19, 2021No CommentsREAD MORE +

Which type of log is displayed?

Refer to the exhibit. Which type of log is displayed?A . IDSB . proxyC . NetFlowD . sysView AnswerAnswer: D

September 19, 2021No CommentsREAD MORE +

Which type of log is displayed?

Refer to the exhibit. Which type of log is displayed?A . proxyB . NetFlowC . IDSD . sysView AnswerAnswer: B

September 18, 2021No CommentsREAD MORE +

Which security technology allows only a set of pre-approved applications to run on a system?

Which security technology allows only a set of pre-approved applications to run on a system?A . application-level blacklistingB . host-based IPSC . application-level whitelistingD . antivirusView AnswerAnswer: C

September 18, 2021No CommentsREAD MORE +

Which piece of information is needed to search for additional downloads of this file by other hosts?

A malicious file has been identified in a sandbox analysis tool. Which piece of information is needed to search for additional downloads of this file by other hosts?A . file typeB . file sizeC . file nameD . file hash valueView AnswerAnswer: D

September 18, 2021No CommentsREAD MORE +

What information is depicted?

Refer to the exhibit. What information is depicted?A . IIS dataB . NetFlow dataC . network discovery eventD . IPS event dataView AnswerAnswer: B

September 17, 2021No CommentsREAD MORE +