Which type of attack is being executed?
Refer to the exhibit. Which type of attack is being executed? A. cross-site request forgery B. command injection C. SQL injection D. cross-site scripting
Refer to the exhibit. Which type of attack is being executed? A. cross-site request forgery B. command injection C. SQL injection D. cross-site scripting
Which technology on a host is used to isolate a running application from other application? A. application allow list B. application block list C. host-based firewall D. sandbox
An organization’s security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning. How should the analyst collect the traffic to isolate the suspicious host? A.…
Refer to the exhibit. Which piece of information is needed to search for additional downloads of this file by other hosts? A. file header type B. file size C. file name D. file hash value
Refer to the exhibit. An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized? A. indirect B. circumstantial C. corroborative D. best
What does cyber attribution identify in an investigation? A. cause of an attack B. exploit of an attack C. vulnerabilities exploited D. threat actors of an attack
Which attack represents the evasion technique of resource exhaustion? A. SQL injection B. bluesnafring C. denial-of-service D. man-in-the-middle
When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred? A. firewall logs B. full packet capture C. session data D. NetFlow data
What is indicated by an increase in IPv4 traffic carrying protocol 41? A. deployment of a GRE network on top of an existing Layer 3 network B. attempts to tunnel IPv6 traffic through an IPv4 network C. unauthorized peer-to-peer traffic…
An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications Which technology should be used to accomplish the task? A.…