Referring to the play that is shown here, which three statements are correct? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Referring to the play that is shown here, which three statements are correct? (Choose three.) This play is a high-fidelity report/event. The data source is from the IDS. The data…

Continue ReadingReferring to the play that is shown here, which three statements are correct? (Choose three.)

Regarding the plays in a playbook, match the description to the section of a play.

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Regarding the plays in a playbook, match the description to the section of a play. action ==> documents the actions to take during the incident response phase reference ==> provides the bulk…

Continue ReadingRegarding the plays in a playbook, match the description to the section of a play.

What is the typical next step after the analyst runs the plays in the playbook?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What is the typical next step after the analyst runs the plays in the playbook? collection and analysis information sharing detection mitigation and remediation Explanation & Hint: The typical next…

Continue ReadingWhat is the typical next step after the analyst runs the plays in the playbook?

Which section of the play is intended to provide background information and a good reason why the play exists?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which section of the play is intended to provide background information and a good reason why the play exists? report identification working action analysis reference objective Explanation & Hint: The…

Continue ReadingWhich section of the play is intended to provide background information and a good reason why the play exists?

Which two statements about a playbook are correct? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which two statements about a playbook are correct? (Choose two.) A playbook is a prescriptive collection of repeatable plays (reports and methods) to detect and respond to security incidents. A…

Continue ReadingWhich two statements about a playbook are correct? (Choose two.)

Which tool is used to block suspicious DNS queries by domain names rather than by IP addresses?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which tool is used to block suspicious DNS queries by domain names rather than by IP addresses? DNS sinkhole BGP black hole firewall IPS Explanation & Hint: The tool used…

Continue ReadingWhich tool is used to block suspicious DNS queries by domain names rather than by IP addresses?

Which section of the play references the data query to be run against SIEM?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which section of the play references the data query to be run against SIEM? report identification working action analysis reference objective Explanation & Hint: In the context of conducting a…

Continue ReadingWhich section of the play references the data query to be run against SIEM?

When conducting a security incident investigation, which statement is true?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

When conducting a security incident investigation, which statement is true? The Tier 1 SOC analyst should perform an in-depth malware file analysis, using tools such as VirusTotal and Malwr.com. Slowly…

Continue ReadingWhen conducting a security incident investigation, which statement is true?

With the China Chopper RAT, which protocol should the analyst monitor closely to detect the caidao.exe client communications with the compromised web server?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

With the China Chopper RAT, which protocol should the analyst monitor closely to detect the caidao.exe client communications with the compromised web server? SMTP HTTP or HTTPS FTP DNS SSH…

Continue ReadingWith the China Chopper RAT, which protocol should the analyst monitor closely to detect the caidao.exe client communications with the compromised web server?

While investigating a security event, the Tier 1 SOC analyst will have a set of objectives or questions they should answer. Match each objective to its description.

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

While investigating a security event, the Tier 1 SOC analyst will have a set of objectives or questions they should answer. Match each objective to its description. defines the threat…

Continue ReadingWhile investigating a security event, the Tier 1 SOC analyst will have a set of objectives or questions they should answer. Match each objective to its description.

What are two important reasons why the SOC analysts should not quickly formulate a conclusion that identifies the threat actor of the attack, based on a single IDS alert? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

What are two important reasons why the SOC analysts should not quickly formulate a conclusion that identifies the threat actor of the attack, based on a single IDS alert? (Choose…

Continue ReadingWhat are two important reasons why the SOC analysts should not quickly formulate a conclusion that identifies the threat actor of the attack, based on a single IDS alert? (Choose two.)

Which four of the following are attack capabilities that are available with the China Chopper RAT Trojan? (Choose four.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which four of the following are attack capabilities that are available with the China Chopper RAT Trojan? (Choose four.) brute force password file management SSL/TLS session decode virtual terminal (command…

Continue ReadingWhich four of the following are attack capabilities that are available with the China Chopper RAT Trojan? (Choose four.)

Which two of the following are best practices to help reduce the possibility of malware arriving on the target systems? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which two of the following are best practices to help reduce the possibility of malware arriving on the target systems? (Choose two.) When developing software, implement secure coding practices, which…

Continue ReadingWhich two of the following are best practices to help reduce the possibility of malware arriving on the target systems? (Choose two.)

Session data provides the IP 5-tuple that is associated with an HTTP connection, along with byte counts, packet counts, and a time stamp. What three additional transaction data types can be obtained from a proxy server log? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Session data provides the IP 5-tuple that is associated with an HTTP connection, along with byte counts, packet counts, and a time stamp. What three additional transaction data types can…

Continue ReadingSession data provides the IP 5-tuple that is associated with an HTTP connection, along with byte counts, packet counts, and a time stamp. What three additional transaction data types can be obtained from a proxy server log? (Choose three.)

Logs from a DHCP server can be leveraged to accomplish which of the following?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Logs from a DHCP server can be leveraged to accomplish which of the following? attributing a unique username to an IP address mapping an IP address to a hostname identifying…

Continue ReadingLogs from a DHCP server can be leveraged to accomplish which of the following?

Considering the following IPS alert, which of the following HTTP transaction records provides the most relevant correlation with the alert?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Considering the following IPS alert, which of the following HTTP transaction records provides the most relevant correlation with the alert? Count:7 Event#7.2 2017-01-03 21:31:44 FILE-FLASH Adobe Flash Player integer underflow…

Continue ReadingConsidering the following IPS alert, which of the following HTTP transaction records provides the most relevant correlation with the alert?