According to NIST what option is unnecessary for containment strategy?

According to NIST what option is unnecessary for containment strategy?A . The delayed containmentB . Monitoring with methods other than sandboxingView AnswerAnswer: AB

July 17, 2018 No Comments READ MORE +

Which two HTTP header fields relate to intrusion analysis? (Choose two).

Which two HTTP header fields relate to intrusion analysis? (Choose two).A . user-agentB . hostC . connectionD . languageE . handshake typeView AnswerAnswer: AB

July 16, 2018 No Comments READ MORE +

Which element can be used by a threat actor to discover a possible opening into a target network and can also be used by an analyst to determine the protocol of the malicious traffic?

Which element can be used by a threat actor to discover a possible opening into a target network and can also be used by an analyst to determine the protocol of the malicious traffic?A . TTLsB . portsC . SMTP repliesD . IP addressesView AnswerAnswer: B

July 10, 2018 No Comments READ MORE +

What is accomplished in the identification phase of incident handling?

What is accomplished in the identification phase of incident handling?A . determining the responsible userB . identifying source and destination IP addressesC . defining the limits of your authority related to a security eventD . determining that a security event has occurredView AnswerAnswer: D

July 7, 2018 No Comments READ MORE +

What are the metric values of the confidentiality based on the CVSS framework?

What are the metric values of the confidentiality based on the CVSS framework?A . Low-highB . Low CMedium-highC . High-Low-noneView AnswerAnswer: C

July 3, 2018 No Comments READ MORE +

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?

During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?A . collectionB . examinationC . reportingD . investigationView AnswerAnswer: A

July 3, 2018 No Comments READ MORE +

Which stakeholder group is responsible for containment, eradication, and recovery in incident handling?

Which stakeholder group is responsible for containment, eradication, and recovery in incident handling?A . facilitatorsB . practitionersC . leaders and managersD . decision makersView AnswerAnswer: C

June 29, 2018 No Comments READ MORE +

In addition to cybercrime and attacks, evidence found on a system or network may be presented in a court of law to support accusations of crime or civil action, including which of the following?

In addition to cybercrime and attacks, evidence found on a system or network may be presented in a court of law to support accusations of crime or civil action, including which of the following?A . Fraud, money laundering, and theftB . Drug-related crimeC . Murder and acts of violenceD ....

June 25, 2018 No Comments READ MORE +

What can be determined from this ping result?

Refer to the exhibit. What can be determined from this ping result?A . The public IP address of cisco.com is 2001:420:1101:1::a.B . The Cisco.com website is down.C . The Cisco.com website is responding with an internal IE . The public IP address of cisco.com is an IPv4 address.View AnswerAnswer: A

June 22, 2018 No Comments READ MORE +

Which goal of data normalization is true?

Which goal of data normalization is true?A . Reduce data redundancy.B . Increase data redundancy.C . Reduce data availability.D . Increase data availabilityView AnswerAnswer: A

June 12, 2018 No Comments READ MORE +