In which log collection mechanism, the system or application sends log records either on the local disk or over the network.
Arule-based
Bpull-based
Cpush-based
Dsignature-based
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
APlanning and budgeting –> Physical location and structural design considerations –> Work area considerations –> Human resource considerations –> Physical security recommendations –> Forensics lab licensing
BPlanning and budgeting –> Physical location and structural design considerations–> Forensics lab licensing –> Human resource considerations –> Work area considerations –> Physical security recommendations
CPlanning and budgeting –> Forensics lab licensing –> Physical location and structural design considerations –> Work area considerations –> Physical security recommendations –> Human resource considerations
DPlanning and budgeting –> Physical location and structural design considerations –> Forensics lab licensing –>Work area considerations –> Human resource considerations –> Physical security recommendations
Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers.
What is Ray and his team doing?
ABlocking the Attacks
BDiverting the Traffic
CDegrading the services
DAbsorbing the Attack
Which of the following technique involves scanning the headers of IP packets leaving a network to make sure that the unauthorized or malicious traffic never leaves the internal network?
AEgress Filtering
BThrottling
CRate Limiting
DIngress Filtering
Juliea a SOC analyst, while monitoring logs, noticed large TXT, NULL payloads.
What does this indicate?
AConcurrent VPN Connections Attempt
BDNS Exfiltration Attempt
CCovering Tracks Attempt
DDHCP Starvation Attempt
Wesley is an incident handler in a company named Maddison Tech. One day, he was learning techniques for eradicating the insecure deserialization attacks.
What among the following should Wesley avoid from considering?
ADeserialization of trusted data must cross a trust boundary
BUnderstand the security permissions given to serialization and deserialization
CAllow serialization for security-sensitive classes
DValidate untrusted input, which is to be serialized to ensure that serialized data contain only trusted classes
Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket raised regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he has performed incident analysis and validation to check whether the incident is a true incident or a false positive.
Identify the stage in which he is currently in.
APost-Incident Activities
BIncident Recording and Assignment
CIncident Triage
DIncident Disclosure
Which of the following Windows features is used to enable Security Auditing in Windows?
ABitlocker
BWindows Firewall
CLocal Group Policy Editor
DWindows Defender
Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?
ARansomware Attack
BDoS Attack
CDHCP starvation Attack
DFile Injection Attack
What does [-n] in the following checkpoint firewall log syntax represents? fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert name|all)] [-g] [logfile]
ASpeed up the process by not performing IP addresses DNS resolution in the Log files
BDisplay both the date and the time for each log record
CDisplay account log records only
DDisplay detailed log chains (all the log segments a log record consists of)
What does Windows event ID 4740 indicate?
AA user account was locked out.
BA user account was disabled.
CA user account was enabled.
DA user account was created.
Which of the following attack inundates DHCP servers with fake DHCP requests to exhaust all available IP addresses?
ADHCP Starvation Attacks
BDHCP Spoofing Attack
CDHCP Port Stealing
DDHCP Cache Poisoning
Which of the following is a correct flow of the stages in an incident handling and response (IH&R) process?
Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating files at /var/log/wtmp.
What Chloe is looking at?
AError log
BSystem boot log
CGeneral message and system-related stuff
DLogin records
What does HTTPS Status code 403 represents?
AUnauthorized Error
BNot Found Error
CInternal Server Error
DForbidden Error
Jane, a security analyst, while analyzing IDS logs, detected an event matching Regex /((%3C)|<)((%69)|i|(%49))((%6D)|m|(%4D))((%67)|g|(%47))[^\n]+((%3E)|>)/|.
What does this event log indicate?
ADirectory Traversal Attack
BParameter Tampering Attack
CXSS Attack
DSQL Injection Attack
The threat intelligence, which will help you, understand adversary intent and make informed decision to ensure appropriate security in alignment with risk.
What kind of threat intelligence described above?
ATactical Threat Intelligence
BStrategic Threat Intelligence
CFunctional Threat Intelligence
DOperational Threat Intelligence
What type of event is recorded when an application driver loads successfully in Windows?
AError
BSuccess Audit
CWarning
DInformation
Identify the type of attack, an attacker is attempting on www.example.com website.
ACross-site Scripting Attack
BSession Attack
CDenial-of-Service Attack
DSQL Injection Attack
John, a threat analyst at GreenTech Solutions, wants to gather information about specific threats against the organization. He started collecting information from various sources, such as humans, social media, chat room, and so on, and created a report that contains malicious activity.
Which of the following types of threat intelligence did he use?
AStrategic Threat Intelligence
BTechnical Threat Intelligence
CTactical Threat Intelligence
DOperational Threat Intelligence
What does the Security Log Event ID 4624 of Windows 10 indicate?
AService added to the endpoint
BA share was assessed
CAn account was successfully logged on
DNew process executed
What does the HTTP status codes 1XX represents?
AInformational message
BClient error
CSuccess
DRedirection
In which phase of Lockheed Martin's – Cyber Kill Chain Methodology, adversary creates a deliverable malicious payload using an exploit and a backdoor?
AReconnaissance
BDelivery
CWeaponization
DExploitation
Identify the attack, where an attacker tries to discover all the possible information about a target network before launching a further attack.
ADoS Attack
BMan-In-Middle Attack
CRansomware Attack
DReconnaissance Attack
Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company and wanted to check the logs that are generated by access control list numbered 210.
What filter should Peter add to the 'show logging' command to get the required output?