At the start of an investigation on a Windows system, the lead handler executes the following commands after inserting a USB drive. What is the purpose of this command? C:\ >dir / s / a dhsra d: \ > a: \ IRCD.txt
ATo create a file on the USB drive that contains a listing of the C: drive
BTo show hidden and archived files on the C: drive and copy them to the USB drive
CTo copy a forensic image of the local C: drive onto the USB drive
DTo compare a list of known good hashes on the USB drive to files on the local C: drive
An analyst will capture traffic from an air-gapped network that does not use DNS. The analyst is looking for unencrypted Syslog data being transmitted. Which of the following is most efficient for this purpose?
Atcpdump –s0 –i eth0 port 514
Btcpdump –nnvvX –i eth0 port 6514
Ctcpdump –nX –i eth0 port 514
Dtcpdump –vv –i eth0 port 6514
Which of the following is best defined as "anything that has the potential to target known or existing vulnerabilities in a system?"
AVector
BGateway
CThreat
DExploit
Which type of media should the IR team be handling as they seek to understand the root cause of an incident?
ARestored media from full backup of the infected host
BMedia from the infected host, copied to the dedicated IR host
COriginal media from the infected host
DBit-for-bit image from the infected host
Question 6
Incident Response Concepts and Application
0
Question 7
Intrusion Detection and Packet Analysis
Question 8
Network Security Monitoring Concepts and Application
Question 9
Defensive Infrastructure and Tactics
Question 10
Defensive Infrastructure and Tactics
Question 11
Incident Response Concepts and Application
Question 12
Penetration Testing Concepts
Question 13
Digital Forensics Concepts and Application
Question 14
Intrusion Detection and Packet Analysis
Question 15
Digital Forensics Concepts and Application
Question 16
Defensive Infrastructure and Tactics
Question 17
Intrusion Detection and Packet Analysis
Question 18
Defensive Infrastructure and Tactics
Question 19
Incident Response Concepts and Application
Question 20
Defensive Infrastructure and Tactics
Question 21
Intrusion Detection and Packet Analysis
Question 22
Defending Network Protocols
Question 23
Incident Response Concepts and Application
Question 24
Incident Response Concepts and Application
Question 25
Defending Network Protocols
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
An incident response team is handling a worm infection among their user workstations. They created an IPS signature to detect and block worm activity on the border IPS, then removed the worms artifacts or workstations triggering the rule. Despite this action, worm activity continued for days after. Where did the incident response team fail?
AThe team did not adequately apply lessons learned from the incident
BThe custom rule did not detect all infected workstations
CThey did not receive timely notification of the security event
DThe team did not understand the worm’s propagation method
On which layer of the OSI Reference Model does the FWSnort utility function?
APhysical Layer
BData Link Layer
CTransport Layer
DSession Layer
EApplication Layer
Which Unix administration tool is designed to monitor configuration changes to Cisco, Extreme and Foundry infrastructure devices?
ASNMP
BNetflow
CRANCID
DRMON
If a Cisco router is configured with the "service config" configuration statement, which of the following tools could be used by an attacker to apply a new router configuration?
ATFTPD
BHydra
CEttercap
DYersinia
Michael, a software engineer, added a module to a banking customers code. The new module deposits small amounts of money into his personal bank account.
Michael has access to edit the code, but only code reviewers have the ability to commit modules to production. The code reviewers have a backlog of work, and are often willing to trust the software developers testing and confidence in the code.
Which technique is Michael most likely to engage to implement the malicious code?
ADenial of Service
BRace Condition
CPhishing
DSocial Engineering
Of the following pieces of digital evidence, which would be collected FIRST from a live system involved in an incident?
AEvent logs from a central repository
BDirectory listing of system files
CMedia in the CDrom drive
DSwap space and page files
Which of the following attacks would use ".." notation as part of a web request to access restricted files and directories, and possibly execute code on the web server?
AURL directory
BHTTP header attack
CSQL injection
DIDS evasion
ECross site scripting
Why might an administrator not be able to delete a file using the Windows del command without specifying additional command line switches?
ABecause it has the read-only attribute set
BBecause it is encrypted
CBecause it has the nodel attribute set
DBecause it is an executable file
Why would the pass action be used in a Snort configuration file?
AThe pass action simplifies some filtering by specifying what to ignore.
BThe pass action passes the packet onto further rules for immediate analysis.
CThe pass action serves as a placeholder in the snort configuration file for future rule updates.
DUsing the pass action allows a packet to be passed to an external process.
EThe pass action increases the number of false positives, better testing the rules.
Which command tool can be used to change the read-only or hidden setting of the file in the screenshot?
Aattrib
Btype
Ctasklist
Ddir
Who is ultimately responsible for approving methods and controls that will reduce any potential risk to an organization?
ASenior Management
BData Owner
CData Custodian
DSecurity Auditor
An internal host at IP address 10.10.50.100 is suspected to be communicating with a command and control whenever a user launches browser window. What features and settings of Wireshark should be used to isolate and analyze this network traffic?
AFilter traffic using ip.src = = 10.10.50.100 and tcp.srcport = = 80, and use Expert Info
BFilter traffic using ip.src = = 10.10.50.100 and tcp.dstport = = 53, and use Expert Info
CFilter traffic using ip.src = = 10.10.50.100 and tcp.dstport = = 80, and use Follow TCP stream
DFilter traffic using ip.src = = 10.10.50.100, and use Follow TCP stream
A company wants to allow only company-issued devices to attach to the wired and wireless networks. Additionally, devices that are not up-to-date with OS patches need to be isolated from the rest of the network until they are updated. Which technology standards or protocols would meet these requirements?
A802.1x and Network Access Control
BKerberos and Network Access Control
CLDAP and Authentication, Authorization and Accounting (AAA)
D802.11i and Authentication, Authorization and Accounting (AAA)
When attempting to collect data from a suspected system compromise, which of the following should generally be collected first?
AThe network connections and open ports
BThe contents of physical memory
CThe current routing table
DA list of the running services
Before re-assigning a computer to a new employee, what data security technique does the IT department use to make sure no data is left behind by the previous user?
AFingerprinting
BDigital watermarking
CBaselining
DWiping
What feature of Wireshark allows the analysis of one HTTP conversation?
AFollow UDP Stream
BFollow TCP Stream
CConversation list > IPV4
DSetting a display filter to ‘tcp’
From a security perspective, how should the Root Bridge be determined in a Spanning Tree Protocol (STP) environment?
AManually selected and defined by the network architect or engineer.
BDefined by selecting the highest Bridge ID to be the root bridge.
CAutomatically selected by the Spanning Tree Protocol (STP).
DAll switch interfaces become root bridges in an STP environment.
Which tasks would a First Responder perform during the Identification phase of Incident Response?
AVerify the root cause of the incident and apply any missing security patches.
BInstall or reenable host-based firewalls and anti-virus software on suspected systems.
CSearch for sources of data and information that may be valuable in confirming and containing an incident.
DDisconnect network communications and search for malicious executables or processes.
What should happen before acquiring a bit-for-bit copy of suspect media during incident response?
AEncrypt the original media to protect the data
BCreate a one-way hash of the original media
CDecompress files on the original media
DDecrypt the original media
How does the Cisco IOS IP Source Guard feature help prevent spoofing attacks?
AFilters traffic based on IP address once a DHCP address has been assigned
BPrevents unauthorized MAC addresses from receiving an IP address on the network
CBlocks unsolicited ARP packets after a client has received an IP address
DRate limits client traffic to prevent CAM table flooding