What is a sandbox interprocess communication service?
What is a sandbox interprocess communication service?A . A collection of rules within the sandbox that prevent the communication between sandboxes.B . A collection of network services that are activated on an interface, allowing for inter-port communication.C . A collection of interfaces that allow for coordination of activities among processes.D...
Which obfuscation technique is the attacker using?
An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication. Which obfuscation technique is the attacker using?A . Base64 encodingB...
How does an SSL certificate impact security between the client and the server?
How does an SSL certificate impact security between the client and the server?A . by enabling an authenticated channel between the client and the serverB . by creating an integrated channel between the client and the serverC . by enabling an authorized channel between the client and the serverD ....
Which type of evidence is this?
A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor. Which type of evidence is this?A . best evidenceB . prima facie evidenceC . indirect evidenceD . physical...
Which identifier tracks an active program?
A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?A . application identification numberB . active process identification numberC . runtime identification numberD . process identification numberView AnswerAnswer: D
What is a difference between tampered and untampered disk images?
What is a difference between tampered and untampered disk images?A . Tampered images have the same stored and computed hash.B . Tampered images are used as evidence.C . Untampered images are used for forensic investigations.D . Untampered images are deliberately altered to preserve as evidenceView AnswerAnswer: B
Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?
Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?A . AWSB . IISC . Load balancerD . Proxy serverView AnswerAnswer: B
What is the impact of false positive alerts on business compared to true positive?
What is the impact of false positive alerts on business compared to true positive?A . True positives affect security as no alarm is raised when an attack has taken place, resulting in a potential breach.B . True positive alerts are blocked by mistake as potential attacks affecting application availability.C ....
Which type of web server attack is represented?
Refer to the exhibit. This request was sent to a web application server driven by a database. Which type of web server attack is represented?A . parameter manipulationB . heap memory corruptionC . command injectionD . blind SQL injectionView AnswerAnswer: D
Which NIST IR category stakeholder is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies?
Which NIST IR category stakeholder is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies?A . CSIRTB . PSIRTC . public affairsD . managementView AnswerAnswer: D