Which network device creates and sends the initial packet of a session?
Which network device creates and sends the initial packet of a session? A. source B. origination C. destination D. network
Which network device creates and sends the initial packet of a session? A. source B. origination C. destination D. network
When performing threat hunting against a DNS server, which traffic toward the affected domain is considered a starting point? A. HTTPS traffic B. TCP traffic C. HTTP traffic D. UDP traffic
An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group. Which term defines the initial event in the NIST SP800- 61 r2? A. instigator B. precursor C. online assault D. trigger
You have run a suspicious file in a sandbox analysis tool to see what the file does. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed or…
Which option filters a LibPCAP capture that used a host as a gateway? A. tcp|udp] [src|dst] port <port> B. [src|dst] net <net> [{mask <mask>}|{len <len>}] C. ether [src|dst] host <ehost> D. gateway host <host>
Which source provides reports of vulnerabilities in software and hardware to a Security Operations Center? A. Analysis Center B. National CSIRT C. Internal CSIRT D. Physical Security
What information from HTTP logs can be used to find a threat actor? A. referer B. IP address C. user-agent D. URL
Which element is part of an incident response plan? A. organizational approach to incident response B. organizational approach to security C. disaster recovery D. backups
Refer to the exhibit. What can be determined from this ping result? A. The public IP address of cisco.com is 2001:420:1101:1::a. B. The Cisco.com website is down. C. The Cisco.com website is responding with an internal IP. D. The public…
What mechanism does the Linux operating system provide to control access to files? A. privileges required B. user interaction C. file permissions D. access complexity