Which type of web server attack is represented?

Refer to the exhibit. This request was sent to a web application server driven by a database. Which type of web server attack is represented?A . parameter manipulationB . heap memory corruptionC . command injectionD . blind SQL injectionView AnswerAnswer: D

January 28, 2021No CommentsREAD MORE +

Which process is used when IPS events are removed to improve data integrity?

Which process is used when IPS events are removed to improve data integrity?A . data availabilityB . data normalizationC . data signatureD . data protectionView AnswerAnswer: B

August 14, 2020No CommentsREAD MORE +

Which event artifact is used to identity HTTP GET requests for a specific file?

Which event artifact is used to identity HTTP GET requests for a specific file?A . destination IP addressB . TCP ACKC . HTTP status codeD . URIView AnswerAnswer: D

August 13, 2020No CommentsREAD MORE +

Which category classifies the intrusion?

A user received a malicious attachment but did not run it. Which category classifies the intrusion?A . weaponizationB . reconnaissanceC . installationD . deliveryView AnswerAnswer: D

August 13, 2020No CommentsREAD MORE +

Which information is available on the server certificate?

When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification. Which information is available on the server certificate?A . server name, trusted subordinate CA, and private keyB . trusted subordinate CA, public key, and cipher suitesC . trusted...

August 13, 2020No CommentsREAD MORE +

What makes HTTPS traffic difficult to monitor?

What makes HTTPS traffic difficult to monitor?A . SSL interceptionB . packet header sizeC . signature detection timeD . encryptionView AnswerAnswer: D

August 12, 2020No CommentsREAD MORE +

Which technology makes this behavior possible?

While viewing packet capture data, an analyst sees that one IP is sending and receiving traffic for multiple devices by modifying the IP header. Which technology makes this behavior possible?A . encapsulationB . TORC . tunnelingD . NATView AnswerAnswer: D

August 11, 2020No CommentsREAD MORE +

Which utility blocks a host portscan?

Which utility blocks a host portscan?A . HIDSB . sandboxingC . host-based firewallD . antimalwareView AnswerAnswer: C

August 11, 2020No CommentsREAD MORE +

Which obfuscation technique is the attacker using?

An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture the analyst cannot determine the technique and payload used for the communication. Which obfuscation technique is the attacker using?A . Base64 encodingB...

August 10, 2020No CommentsREAD MORE +

What information is depicted?

Refer to the exhibit. What information is depicted?A . IIS dataB . NetFlow dataC . network discovery eventD . IPS event dataView AnswerAnswer: B

August 9, 2020No CommentsREAD MORE +