Which potential result is true?

Refer to the exhibit. You notice that the email volume history has been abnormally high. Which potential result is true?A . Email sent from your domain might be filtered by the recipient.B . Messages sent to your domain may be queued up until traffic dies down.C . Several hosts in...

May 1, 2018 No Comments READ MORE +

Drag and Drop Question Drag and drop the elements of incident handling from the left into the correct order on the right.

Drag and Drop Question Drag and drop the elements of incident handling from the left into the correct order on the right. View AnswerAnswer:

May 1, 2018 No Comments READ MORE +

Based on nistsp800-61R2 what are the recommended protections against malware?

Based on nistsp800-61R2 what are the recommended protections against malware?A . Malware prevention softwareView AnswerAnswer: A

April 28, 2018 No Comments READ MORE +

Which type of analysis shows what the outcome is as well how likely each outcome is?

Which type of analysis shows what the outcome is as well how likely each outcome is?A . exploratoryB . descriptiveC . probabilisticD . deterministicView AnswerAnswer: C

April 23, 2018 No Comments READ MORE +

Which two pieces of information from the analysis report are needed or required to investigate the callouts?

You have run a suspicious file in a sandbox analysis tool to see what the file does. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed or required to investigate the callouts? (Choose two.)A . file sizeB...

April 22, 2018 No Comments READ MORE +

Which of the following are examples of some of the responsibilities of a corporate CSIRT and the policies it helps create? (Select all that apply.)

Which of the following are examples of some of the responsibilities of a corporate CSIRT and the policies it helps create? (Select all that apply.)A . Scanning vendor customer networksB . Incident classification and handlingC . Information classification and protectionD . Information disseminationE . Record retentions and destructionView AnswerAnswer: BCDE

April 19, 2018 No Comments READ MORE +

Drag and Drop Question Drag and drop the type of evidence from the left onto the correct descnption(s) of that evidence on the right.

Drag and Drop Question Drag and drop the type of evidence from the left onto the correct descnption(s) of that evidence on the right. View AnswerAnswer:

April 17, 2018 No Comments READ MORE +

Which option is generated when a file is run through an algorithm and generates a string specific to the contents of that file?

Which option is generated when a file is run through an algorithm and generates a string specific to the contents of that file?A . URLB . hashC . IP addressD . destination portView AnswerAnswer: B

April 16, 2018 No Comments READ MORE +

Which identifies both the source and destination location?

Which identifies both the source and destination location?A . IP addressB . URLC . portsD . MAC addressView AnswerAnswer: A

April 12, 2018 No Comments READ MORE +

Which type of analysis assigns values to scenarios to see what the outcome might be in each scenario?

Which type of analysis assigns values to scenarios to see what the outcome might be in each scenario?A . deterministicB . exploratoryC . probabilisticD . descriptiveView AnswerAnswer: A

March 31, 2018 No Comments READ MORE +