Match the Linux host-based firewall application with its description.

Match the Linux host-based firewall application with its description. Explanation & Hint: iptables: This is a rule-based access control and logging system for Linux packet filtering based on IP addresses…

Comments Off on Match the Linux host-based firewall application with its description.

What are three goals of a port scan attack? (Choose three.)

What are three goals of a port scan attack? (Choose three.) to discover system passwords to identify operating systems to identify active services to identify peripheral configurations to determine potential…

Comments Off on What are three goals of a port scan attack? (Choose three.)

In which phase of the NIST incident response life cycle is evidence gathered that can assist subsequent investigations by authorities?

In which phase of the NIST incident response life cycle is evidence gathered that can assist subsequent investigations by authorities? preparation detection and analysis containment, eradication, and recovery postincident activities…

Comments Off on In which phase of the NIST incident response life cycle is evidence gathered that can assist subsequent investigations by authorities?

According to NIST standards, which incident response stakeholder is responsible for coordinating an incident response with other stakeholders to minimize the damage of an incident?

According to NIST standards, which incident response stakeholder is responsible for coordinating an incident response with other stakeholders to minimize the damage of an incident? IT support management legal department…

Comments Off on According to NIST standards, which incident response stakeholder is responsible for coordinating an incident response with other stakeholders to minimize the damage of an incident?

When dealing with security threats and using the Cyber Kill Chain model, which two approaches can an organization use to block a potential back door creation? (Choose two.)

When dealing with security threats and using the Cyber Kill Chain model, which two approaches can an organization use to block a potential back door creation? (Choose two.) Conduct damage…

Comments Off on When dealing with security threats and using the Cyber Kill Chain model, which two approaches can an organization use to block a potential back door creation? (Choose two.)

A threat actor collects information from web servers of an organization and searches for employee contact information. The information collected is further used to search personal information on the Internet. To which attack phase do these activities belong according to the Cyber Kill Chain model?

A threat actor collects information from web servers of an organization and searches for employee contact information. The information collected is further used to search personal information on the Internet.…

Comments Off on A threat actor collects information from web servers of an organization and searches for employee contact information. The information collected is further used to search personal information on the Internet. To which attack phase do these activities belong according to the Cyber Kill Chain model?

Which HIDS is integrated into the Security Onion and uses rules to detect changes in host-based operating parameters caused by malware through system calls?

Which HIDS is integrated into the Security Onion and uses rules to detect changes in host-based operating parameters caused by malware through system calls? Bro Snort OSSEC Suricata Answers Explanation…

Comments Off on Which HIDS is integrated into the Security Onion and uses rules to detect changes in host-based operating parameters caused by malware through system calls?

How does an application program interact with the operating system?

How does an application program interact with the operating system? sending files using processes making API calls accessing BIOS or UEFI Answers Explanation & Hints: Application programs interact with an…

Comments Off on How does an application program interact with the operating system?

Which type of events should be assigned to categories in Sguil?

Which type of events should be assigned to categories in Sguil? true positive true negative false positive false negative Answers Explanation & Hints: Sguil includes seven pre-built categories that can…

Comments Off on Which type of events should be assigned to categories in Sguil?