Which type of web server attack is represented?
Refer to the exhibit. This request was sent to a web application server driven by a database. Which type of web server attack is represented?A . parameter manipulationB . heap memory corruptionC . command injectionD . blind SQL injectionView AnswerAnswer: D
Which process is used when IPS events are removed to improve data integrity?
Which process is used when IPS events are removed to improve data integrity?A . data availabilityB . data normalizationC . data signatureD . data protectionView AnswerAnswer: B
Which event artifact is used to identity HTTP GET requests for a specific file?
Which event artifact is used to identity HTTP GET requests for a specific file?A . destination IP addressB . TCP ACKC . HTTP status codeD . URIView AnswerAnswer: D
Which category classifies the intrusion?
A user received a malicious attachment but did not run it. Which category classifies the intrusion?A . weaponizationB . reconnaissanceC . installationD . deliveryView AnswerAnswer: D
Which information is available on the server certificate?
When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification. Which information is available on the server certificate?A . server name, trusted subordinate CA, and private keyB . trusted subordinate CA, public key, and cipher suitesC . trusted...
What makes HTTPS traffic difficult to monitor?
What makes HTTPS traffic difficult to monitor?A . SSL interceptionB . packet header sizeC . signature detection timeD . encryptionView AnswerAnswer: D
Which technology makes this behavior possible?
While viewing packet capture data, an analyst sees that one IP is sending and receiving traffic for multiple devices by modifying the IP header. Which technology makes this behavior possible?A . encapsulationB . TORC . tunnelingD . NATView AnswerAnswer: D
Which utility blocks a host portscan?
Which utility blocks a host portscan?A . HIDSB . sandboxingC . host-based firewallD . antimalwareView AnswerAnswer: C
Which obfuscation technique is the attacker using?
An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture the analyst cannot determine the technique and payload used for the communication. Which obfuscation technique is the attacker using?A . Base64 encodingB...
What information is depicted?
Refer to the exhibit. What information is depicted?A . IIS dataB . NetFlow dataC . network discovery eventD . IPS event dataView AnswerAnswer: B