What attribute belonging VERIS schema?
What attribute belonging VERIS schema?A . confidentiality/possessionB . integrity/authenticityC . availability/utilityView AnswerAnswer: ABC
Which type of log is this an example of?
Refer to the exhibit. Which type of log is this an example of?A . IDS logB . proxy logC . NetFlow logD . syslogView AnswerAnswer: C Explanation: A typical output of a NetFlow command line tool (nfdump in this case) when printing the stored flows may look as follows: Date...
What protocol is related to NAC?
What protocol is related to NAC?A . 802.1QB . 802.1X (EAP-TLS, EAP-PEAP or EAP-MSCHAP)C . 802.1ED . 802.1FView AnswerAnswer: B
Which statement about threat actors is true?
Which statement about threat actors is true?A . They are any company assets that are threatened.B . They are any assets that are threatened.C . They are perpetrators of attacks.D . They are victims of attacks.View AnswerAnswer: C
Which element is included in an incident response plan?
Which element is included in an incident response plan?A . organization missionB . junior analyst approvalC . day-to-day firefightingD . siloed approach to communicationsView AnswerAnswer: A
Which option contains the elements that every event is comprised of according to VERIS incident model'?
In VERIS, an incident is viewed as a series of events that adversely affects the information assets of an organization. Which option contains the elements that every event is comprised of according to VERIS incident model'?A . victim demographics, incident description, incident details, discovery & responseB . victim demographics, incident...
Which kind of evidence can be considered most reliable to arrive at an analytical assertion?
Which kind of evidence can be considered most reliable to arrive at an analytical assertion?A . directB . corroborativeC . indirectD . circumstantialE . textualView AnswerAnswer: A
Which description of a retrospective malware detection is true?
Which description of a retrospective malware detection is true?A . You use Wireshark to identify the malware source.B . You use historical information from one or more sources to identify the affected host or file.C . You use information from a network analyzer to identify the malware source.D . You...
Which type of incident response team is this an example of?
The united State CERT provides cybersecurity protection to Federal, civilian, and executive branch agencies through intrusion detection and prevention capabilities. Which type of incident response team is this an example of?A . Federal PSIRTB . National PSIRTC . National CSIRTD . Federal CSIRTView AnswerAnswer: B
Which category does this event fall under as defined in the Diamond Model of Intrusion?
You see 100 HTTP GET and POST requests for various pages on one of your webservers. The user agent in the requests contain php code that, if executed, creates and writes to a new php file on the webserver. Which category does this event fall under as defined in the...