Loading questions...
Updated
Which of the following attack can be eradicated by converting all non-alphanumeric characters to HTML character entities before displaying the user input in search engines and forums?
Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?
According to the Risk Matrix table, what will be the risk level when the probability of an attack is very low and the impact of that attack is major?
Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?
Which of the following technique involves scanning the headers of IP packets leaving a network to make sure that the unauthorized or malicious traffic never leaves the internal network?
Which of the following formula is used to calculate the EPS of the organization?
Juliea a SOC analyst, while monitoring logs, noticed large TXT, NULL payloads.
What does this indicate?
An organization is implementing and deploying the SIEM with following capabilities.
What is the process of monitoring and capturing all data packets passing through a given network using different tools?
Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process?
According to the forensics investigation process, what is the next step carried out right after collecting the evidence?
Which of the following Windows features is used to enable Security Auditing in Windows?
Which of the following attack can be eradicated by filtering improper XML syntax?
Which of the following attack can be eradicated by using a safe API to avoid the use of the interpreter entirely?
Shawn is a security manager working at Lee Inc Solution. His organization wants to develop threat intelligent strategy plan. As a part of threat intelligent strategy plan, he suggested various components, such as threat intelligence requirement analysis, intelligence and collection planning, asset identification, threat reports, and intelligence buy-in.
Which one of the following components he should include in the above threat intelligent strategy plan to make it effective?
Which of the following can help you eliminate the burden of investigating false positives?
Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?
Identify the password cracking attempt involving a precomputed dictionary of plaintext passwords and their corresponding hash values to crack the password.
Create a free account to unlock all questions for this exam.
Log In / Sign UpBonney's system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
The Syslog message severity levels are labelled from level 0 to level 7.
What does level 0 indicate?
What kind of SIEM deployment architecture the organization is planning to implement?