Which file is allocated with 32 bits?
Which file is allocated with 32 bits? A. NTFS B. FAT32 C. FAT D. EXT4
Which file is allocated with 32 bits? A. NTFS B. FAT32 C. FAT D. EXT4
Which Linux file system allows unlimited folder subdirectory structure A. ext4 B. ext3 C. ext2 D. NTFS
When incident data is collected, it is important that evidentiary cross-contamination is prevented. How is this accomplished? A. by allowing unrestricted access to impacted devices B. by not allowing items of evidence to physically touch C. by ensuring power is…
Which option is the process of remediating the network and systems and/or reconstructing the attack so that the responsible threat actor can be revealed? A. data analytics B. asset attribution C. threat actor attribution D. evidence collection
What can be addressed when using retrospective security techniques? A. if the affected host needs a software update B. what system are affected C. if the affected system needs replacement D. why the malware is still in our network
Which event artifact can be used to identify HTTP GET requests for a specific file? A. HTTP status code B. TCP ACK C. destination IP D. URI
Which CSIRT category provides incident handling services to their parent organization such as a bank, a manufacturing company, a university, or a federal agency? A. internal CSIRT B. national CSIRT C. coordination centers D. analysis centers E. vendor teams F.…
What does the CSIRT incident response provider usually do? A. provide incident handling services to their parent organization. B. provide incident handling services to a country C. coordinate and facilitate the handling of incidents across various CSIRTs D. focus on…
Which of the following is not an example of reconnaissance? A. Searching the robots.txt file B. Redirecting users to a source and scanning traffic to learn about the target C. Scanning without completing the three-way handshake D. Communicating over social…
Which of the following is typically a responsibility of a PSIRT (Product SIRT)? A. Configure the organization’s firewall B. Monitor security logs C. Investigate security incidents in a SOC D. Disclosure vulnerabilities in the organization’s products and services