Q1. What is the following step-by-step description an example of? 1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document. 2. The attacker creates a unique email with the malicious document based on extensive research about their target. 3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
A.Tactic
B. Policy
C. Procedure
D. Technique
Correct Answer: D
Q2. In which phase of the Continuous Monitoring cycle are suggestions and improvements typically made?
A.Define and Predict
B. Establish and Architect
C. Analyze and Report
D. Implement and Collect
Correct Answer: C
Q3. Which search command allows an analyst to match whatever is inside the parentheses as a single term in the index, even if it contains characters that are usually recognized as minor breakers such as periods or underscores?
A.CASE()
B. LIKE()
C. FORMAT ()
D. TERM ()
Correct Answer: D
Q4. What is the main difference between a DDoS and a DoS attack?
A.A DDoS attack is a type of physical attack, while a DoS attack is a type of cyberattack.
B. A DDoS attack uses a single source to target a single system, while a DoS attack uses multiple sources to target multiple systems.
C. A DDoS attack uses multiple sources to target a single system, while a DoS attack uses a single source to target a single or multiple systems.
D. A DDoS attack uses a single source to target multiple systems, while a DoS attack uses multiple sources to target a single system.
Correct Answer: C
Q5. An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?
A.Endpoint
B. Authentication
C. Network traffic
D. Web
Correct Answer: A
$ 39
Reviews
There are no reviews yet.