Which type of code is being used?

Refer to the exhibit. Which type of code is being used?A . ShellB . VBScriptC . BASHD . PythonView AnswerAnswer: D

January 2, 2021 No Comments READ MORE +

What is the next step an engineer should take?

Refer to the exhibit. An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?A . Delete the suspicious email with the attachment as the file is a shortcut extension and...

January 2, 2021 No Comments READ MORE +

Which two steps will prevent these issues from occurring in the future?

A security team is discussing lessons learned and suggesting process changes after a security breach incident. During the incident, members of the security team failed to report the abnormal system activity due to a high project workload. Additionally, when the incident was identified, the response took six hours due to...

January 1, 2021 No Comments READ MORE +

Which anti-forensic technique was used?

An investigator is analyzing an attack in which malicious files were loaded on the network and were undetected. Several of the images received during the attack include repetitive patterns. Which anti-forensic technique was used?A . spoofingB . obfuscationC . tunnelingD . steganographyView AnswerAnswer: D Explanation: Reference: https://doi.org/10.5120/1398-1887 https://www.carbonblack.com/blog/steganography-in-the-modern-attack-landscape/

December 31, 2020 No Comments READ MORE +

Which two actions should be taken by a security analyst to evaluate the file in a sandbox?

A security team receives reports of multiple files causing suspicious activity on users’ workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)A . Inspect registry entriesB...

December 30, 2020 No Comments READ MORE +