Which of the following information security personnel handles incidents from management and technical point of view?
Which of the following information security personnel handles incidents from management and technical point of view?A . Network administratorsB . Incident manager (IM)C . Forensic investigatorsD . Threat researchersView AnswerAnswer: B
Which of the following information security personnel handles incidents from management and technical point of view?
Which of the following information security personnel handles incidents from management and technical point of view?A . Network administratorsB . Incident manager (IM)C . Forensic investigatorsD . Threat researchersView AnswerAnswer: B
James has been appointed as an incident handing and response (IH&R) team lead and was assigned to build an IH&R plan and his own team in the company. Identify the IH&R process step James is currently working on.
James has been appointed as an incident handing and response (IH&R) team lead and was assigned to build an IH&R plan and his own team in the company. Identify the IH&R process step James is currently working on.A . EradicationB . NotificationC . PreparationD . RecoveryView AnswerAnswer: C
Which of the following is not the responsibility of first responders?
Which of the following is not the responsibility of first responders?A . Packaging and transporting the electronic evidenceB . Protecting the crime sceneC . Preserving temporary and fragile evidence and then shutdown or reboot the victim's computerD . Identifying the crime sceneView AnswerAnswer: C
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim's system.
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim's system. Identify the data acquisition method Marley must employ to collect volatile data.A . Live data acquisitionB ....
Johnson is an incident handler and is working on a recent web application attack faced by his organization. As part of this process, he performed data preprocessing in order to analyze and detect the watering hole attack. Johnson preprocessed the outbound network traffic data collected from firewalls and proxy servers. He then started analyzing the user activities within a certain time period to create time ordered domain sequences to perform further analysis on sequential patterns. Identify the data-preprocessing step performed by Johnson.
Johnson is an incident handler and is working on a recent web application attack faced by his organization. As part of this process, he performed data preprocessing in order to analyze and detect the watering hole attack. Johnson preprocessed the outbound network traffic data collected from firewalls and proxy servers....
Which of the following W re shark filters would Bran use to accomplish this task?
Bran is an incident handler who is assessing the network of the organization. He wants to detect ping sweep attempts on the network using Wire shark. Which of the following W re shark filters would Bran use to accomplish this task?A . icmp.type== 8B . icmp.redir_gwC . icmp.identD . icmp.seqView...
Which of the following information security incidents did the Delmont organization face?
Otis is an incident handler working in the Delmont organization. Recently, the organization is facing several setbacks in the business and thereby its revenues are going down. Otis was asked to take charge and look into the matter. While auditing the enterprise security, he found the traces of an attack...
Tibs on works as an incident responder for MNC based in Singapore. He is investigating a web application security incident recently faced by the company. The attack is performed on a MSSQL Server hosted by the company. In the detection and analysis phase, he used regular expressions to analyze and detect SQL meta-characters that led to SQL injection attack. Identify the regular expression used by Tibs on to detect SQL injection attack on MSSQL Server.
Tibs on works as an incident responder for MNC based in Singapore. He is investigating a web application security incident recently faced by the company. The attack is performed on a MSSQL Server hosted by the company. In the detection and analysis phase, he used regular expressions to analyze and...
Andrew, an incident responder, is performing risk assessment of the client organization. As a part of the risk assessment process, he identified the boundaries of the IT systems, along with the resources and the information that constitute the systems.
Andrew, an incident responder, is performing risk assessment of the client organization. As a part of the risk assessment process, he identified the boundaries of the IT systems, along with the resources and the information that constitute the systems. Identify the risk assessment step Andrew is performing.A . Likelihood determinationB...