Which of the following is one of the main goals of data normalization?

Which of the following is one of the main goals of data normalization?A . To save duplicate logs for redundancyB . To purge redundant data while maintaining data integrityC . To correlate IPS and IDS logs with DNSD . To correlate IPS/IDS logs with firewall logsView AnswerAnswer: B

September 8, 2018 No Comments READ MORE +

What information from HTTP logs can be used to find a threat actor?

What information from HTTP logs can be used to find a threat actor?A . refererB . IP addressC . user-agentD . URLView AnswerAnswer: B

September 8, 2018 No Comments READ MORE +

Refer to exhibit

DRAG DROP Refer to exhibit. Drag and drop the items from the left onto the correct 5-tuples on the right. View AnswerAnswer:

September 6, 2018 1 Comment READ MORE +

What is the process of remediation the system from attack so that responsible threat actor can be revealed?

What is the process of remediation the system from attack so that responsible threat actor can be revealed?A . Validating the Attacking Host's IP AddressB . Researching the Attacking Host through Search Engines.C . Using Incident Databases.D . Monitoring Possible Attacker Communication Channels.View AnswerAnswer: A

September 6, 2018 1 Comment READ MORE +

Which incident handling is focused on minimizing the impact of an incident?

Which incident handling is focused on minimizing the impact of an incident?A . ScopingB . ReportingC . ContainmentD . EradicationView AnswerAnswer: D

September 6, 2018 1 Comment READ MORE +

Refer to the exhibit.

Refer to the exhibit. Drag and drop the element name from the left onto the correct piece of the PCAP file on the right. View AnswerAnswer:

September 4, 2018 No Comments READ MORE +

Which of the following is an example of a managed security offering where incident response experts monitor and respond to security alerts in a security operations center (SOC)?

Which of the following is an example of a managed security offering where incident response experts monitor and respond to security alerts in a security operations center (SOC)?A . Cisco CloudLockB . Cisco's Active Threat Analytics (ATA)C . Cisco Managed Firepower ServiceD . Cisco JasperView AnswerAnswer: B

September 4, 2018 No Comments READ MORE +

Which CVSSv3 Attack Vector metric value requires the attacker to physically touch or manipulate the vulnerable component?

Which CVSSv3 Attack Vector metric value requires the attacker to physically touch or manipulate the vulnerable component?A . localB . physicalC . networkD . adjacentView AnswerAnswer: B

September 3, 2018 No Comments READ MORE +

Which CVSSv3 metric captures the level of access that is required for a successful attack?

Which CVSSv3 metric captures the level of access that is required for a successful attack?A . attack vectorB . attack complexityC . privileges requiredD . user interactionView AnswerAnswer: C

September 2, 2018 No Comments READ MORE +

Filtering ports in wireshark?

Filtering ports in wireshark?A . tcp.port == 80B . tcp port equals 80C . tcp.port 80D . port 80View AnswerAnswer: A

September 1, 2018 No Comments READ MORE +