According to NIST what option is unnecessary for containment strategy?
According to NIST what option is unnecessary for containment strategy?A . The delayed containmentB . Monitoring with methods other than sandboxingView AnswerAnswer: AB
Which two HTTP header fields relate to intrusion analysis? (Choose two).
Which two HTTP header fields relate to intrusion analysis? (Choose two).A . user-agentB . hostC . connectionD . languageE . handshake typeView AnswerAnswer: AB
Which element can be used by a threat actor to discover a possible opening into a target network and can also be used by an analyst to determine the protocol of the malicious traffic?
Which element can be used by a threat actor to discover a possible opening into a target network and can also be used by an analyst to determine the protocol of the malicious traffic?A . TTLsB . portsC . SMTP repliesD . IP addressesView AnswerAnswer: B
What is accomplished in the identification phase of incident handling?
What is accomplished in the identification phase of incident handling?A . determining the responsible userB . identifying source and destination IP addressesC . defining the limits of your authority related to a security eventD . determining that a security event has occurredView AnswerAnswer: D
What are the metric values of the confidentiality based on the CVSS framework?
What are the metric values of the confidentiality based on the CVSS framework?A . Low-highB . Low CMedium-highC . High-Low-noneView AnswerAnswer: C
During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?
During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?A . collectionB . examinationC . reportingD . investigationView AnswerAnswer: A
Which stakeholder group is responsible for containment, eradication, and recovery in incident handling?
Which stakeholder group is responsible for containment, eradication, and recovery in incident handling?A . facilitatorsB . practitionersC . leaders and managersD . decision makersView AnswerAnswer: C
In addition to cybercrime and attacks, evidence found on a system or network may be presented in a court of law to support accusations of crime or civil action, including which of the following?
In addition to cybercrime and attacks, evidence found on a system or network may be presented in a court of law to support accusations of crime or civil action, including which of the following?A . Fraud, money laundering, and theftB . Drug-related crimeC . Murder and acts of violenceD ....
What can be determined from this ping result?
Refer to the exhibit. What can be determined from this ping result?A . The public IP address of cisco.com is 2001:420:1101:1::a.B . The Cisco.com website is down.C . The Cisco.com website is responding with an internal IE . The public IP address of cisco.com is an IPv4 address.View AnswerAnswer: A
Which goal of data normalization is true?
Which goal of data normalization is true?A . Reduce data redundancy.B . Increase data redundancy.C . Reduce data availability.D . Increase data availabilityView AnswerAnswer: A