What attribute belonging VERIS schema?

What attribute belonging VERIS schema?A . confidentiality/possessionB . integrity/authenticityC . availability/utilityView AnswerAnswer: ABC

February 23, 2018 No Comments READ MORE +

Which type of log is this an example of?

Refer to the exhibit. Which type of log is this an example of?A . IDS logB . proxy logC . NetFlow logD . syslogView AnswerAnswer: C Explanation: A typical output of a NetFlow command line tool (nfdump in this case) when printing the stored flows may look as follows: Date...

February 16, 2018 2 Comments READ MORE +

What protocol is related to NAC?

What protocol is related to NAC?A . 802.1QB . 802.1X (EAP-TLS, EAP-PEAP or EAP-MSCHAP)C . 802.1ED . 802.1FView AnswerAnswer: B

February 16, 2018 No Comments READ MORE +

Which statement about threat actors is true?

Which statement about threat actors is true?A . They are any company assets that are threatened.B . They are any assets that are threatened.C . They are perpetrators of attacks.D . They are victims of attacks.View AnswerAnswer: C

February 9, 2018 No Comments READ MORE +

Which element is included in an incident response plan?

Which element is included in an incident response plan?A . organization missionB . junior analyst approvalC . day-to-day firefightingD . siloed approach to communicationsView AnswerAnswer: A

February 8, 2018 No Comments READ MORE +

Which option contains the elements that every event is comprised of according to VERIS incident model'?

In VERIS, an incident is viewed as a series of events that adversely affects the information assets of an organization. Which option contains the elements that every event is comprised of according to VERIS incident model'?A . victim demographics, incident description, incident details, discovery & responseB . victim demographics, incident...

February 6, 2018 No Comments READ MORE +

Which kind of evidence can be considered most reliable to arrive at an analytical assertion?

Which kind of evidence can be considered most reliable to arrive at an analytical assertion?A . directB . corroborativeC . indirectD . circumstantialE . textualView AnswerAnswer: A

February 6, 2018 No Comments READ MORE +

Which description of a retrospective malware detection is true?

Which description of a retrospective malware detection is true?A . You use Wireshark to identify the malware source.B . You use historical information from one or more sources to identify the affected host or file.C . You use information from a network analyzer to identify the malware source.D . You...

February 1, 2018 No Comments READ MORE +

Which type of incident response team is this an example of?

The united State CERT provides cybersecurity protection to Federal, civilian, and executive branch agencies through intrusion detection and prevention capabilities. Which type of incident response team is this an example of?A . Federal PSIRTB . National PSIRTC . National CSIRTD . Federal CSIRTView AnswerAnswer: B

January 26, 2018 1 Comment READ MORE +

Which category does this event fall under as defined in the Diamond Model of Intrusion?

You see 100 HTTP GET and POST requests for various pages on one of your webservers. The user agent in the requests contain php code that, if executed, creates and writes to a new php file on the webserver. Which category does this event fall under as defined in the...

January 26, 2018 No Comments READ MORE +