Which two statements about a playbook are correct? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which two statements about a playbook are correct? (Choose two.) A playbook is a prescriptive collection of repeatable plays (reports and methods) to detect and respond to security incidents. A…

Continue ReadingWhich two statements about a playbook are correct? (Choose two.)

Which tool is used to block suspicious DNS queries by domain names rather than by IP addresses?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which tool is used to block suspicious DNS queries by domain names rather than by IP addresses? DNS sinkhole BGP black hole firewall IPS Explanation & Hint: The tool used…

Continue ReadingWhich tool is used to block suspicious DNS queries by domain names rather than by IP addresses?

Which section of the play references the data query to be run against SIEM?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which section of the play references the data query to be run against SIEM? report identification working action analysis reference objective Explanation & Hint: In the context of conducting a…

Continue ReadingWhich section of the play references the data query to be run against SIEM?

When conducting a security incident investigation, which statement is true?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

When conducting a security incident investigation, which statement is true? The Tier 1 SOC analyst should perform an in-depth malware file analysis, using tools such as VirusTotal and Malwr.com. Slowly…

Continue ReadingWhen conducting a security incident investigation, which statement is true?

With the China Chopper RAT, which protocol should the analyst monitor closely to detect the caidao.exe client communications with the compromised web server?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

With the China Chopper RAT, which protocol should the analyst monitor closely to detect the caidao.exe client communications with the compromised web server? SMTP HTTP or HTTPS FTP DNS SSH…

Continue ReadingWith the China Chopper RAT, which protocol should the analyst monitor closely to detect the caidao.exe client communications with the compromised web server?

While investigating a security event, the Tier 1 SOC analyst will have a set of objectives or questions they should answer. Match each objective to its description.

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

While investigating a security event, the Tier 1 SOC analyst will have a set of objectives or questions they should answer. Match each objective to its description. defines the threat…

Continue ReadingWhile investigating a security event, the Tier 1 SOC analyst will have a set of objectives or questions they should answer. Match each objective to its description.

What are two important reasons why the SOC analysts should not quickly formulate a conclusion that identifies the threat actor of the attack, based on a single IDS alert? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

What are two important reasons why the SOC analysts should not quickly formulate a conclusion that identifies the threat actor of the attack, based on a single IDS alert? (Choose…

Continue ReadingWhat are two important reasons why the SOC analysts should not quickly formulate a conclusion that identifies the threat actor of the attack, based on a single IDS alert? (Choose two.)

Which four of the following are attack capabilities that are available with the China Chopper RAT Trojan? (Choose four.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which four of the following are attack capabilities that are available with the China Chopper RAT Trojan? (Choose four.) brute force password file management SSL/TLS session decode virtual terminal (command…

Continue ReadingWhich four of the following are attack capabilities that are available with the China Chopper RAT Trojan? (Choose four.)

Which two of the following are best practices to help reduce the possibility of malware arriving on the target systems? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which two of the following are best practices to help reduce the possibility of malware arriving on the target systems? (Choose two.) When developing software, implement secure coding practices, which…

Continue ReadingWhich two of the following are best practices to help reduce the possibility of malware arriving on the target systems? (Choose two.)

Session data provides the IP 5-tuple that is associated with an HTTP connection, along with byte counts, packet counts, and a time stamp. What three additional transaction data types can be obtained from a proxy server log? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Session data provides the IP 5-tuple that is associated with an HTTP connection, along with byte counts, packet counts, and a time stamp. What three additional transaction data types can…

Continue ReadingSession data provides the IP 5-tuple that is associated with an HTTP connection, along with byte counts, packet counts, and a time stamp. What three additional transaction data types can be obtained from a proxy server log? (Choose three.)

Logs from a DHCP server can be leveraged to accomplish which of the following?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Logs from a DHCP server can be leveraged to accomplish which of the following? attributing a unique username to an IP address mapping an IP address to a hostname identifying…

Continue ReadingLogs from a DHCP server can be leveraged to accomplish which of the following?

Considering the following IPS alert, which of the following HTTP transaction records provides the most relevant correlation with the alert?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Considering the following IPS alert, which of the following HTTP transaction records provides the most relevant correlation with the alert? Count:7 Event#7.2 2017-01-03 21:31:44 FILE-FLASH Adobe Flash Player integer underflow…

Continue ReadingConsidering the following IPS alert, which of the following HTTP transaction records provides the most relevant correlation with the alert?

Malware often takes the form of binary files. To prove the assertion that a malicious file was downloaded, submitting the output of a sandbox detonation report along with an IPS alert as evidence, as opposed to submitting the binary malware file itself, is an example of which concept?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Malware often takes the form of binary files. To prove the assertion that a malicious file was downloaded, submitting the output of a sandbox detonation report along with an IPS…

Continue ReadingMalware often takes the form of binary files. To prove the assertion that a malicious file was downloaded, submitting the output of a sandbox detonation report along with an IPS alert as evidence, as opposed to submitting the binary malware file itself, is an example of which concept?

The process of relating multiple security event records to gain more clarity than is available from any security event record in isolation is called what?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

The process of relating multiple security event records to gain more clarity than is available from any security event record in isolation is called what? corroboration correlation aggregation normalization summarization…

Continue ReadingThe process of relating multiple security event records to gain more clarity than is available from any security event record in isolation is called what?

Which organization publishes a report of the top 10 most widely exploited web application vulnerabilities?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which organization publishes a report of the top 10 most widely exploited web application vulnerabilities? OWASP Spamhaus Alexa Farsight Explanation & Hint: The organization that publishes a report of the…

Continue ReadingWhich organization publishes a report of the top 10 most widely exploited web application vulnerabilities?