Chapter 15 – Mock Exam 2

  1. 2. Attack Vector | Attack Complexity | Privileges Required.
  2. 4. UDP.
  3. 4. backtack.
  4. 1. Total throughput.
  5. 1. Innovative threats.
  6. 1. File | Export Objects | HTTP....
  7. 3. Machine learning techniques are increasingly being used to support probabilistic analysis.
  8. 3. GET %D2%A2ACME.com/login.php HTTP/1.1 in the Proxy Log.
  9. 4. National CSIRT.
  10. 1. Deterministic analysis.
  11. 1. To map IP addresses to MAC addresses.
  12. 3. Unsolicited professional social media requests are made, asking for information about an upcoming job opportunity.
  13. 2. Pre-emptive safeguards.
  14. 3. Support for encryption.
  15. 1. Sandbox Detection allows the API calls to be recorded.
  16. 1. The attack code is launched.
  17. 2. Organizational senior management.
  18. 1. Correlation rules in the Firepower management console.
  19. 2. Executive board members.
  20. 3. If the attachment was legitimate, this is a False Positive.
  21. 2. Network data showing a spike in traffic from that computer over the last two days.
  22. 2. Reducing duplication.
  23. 3. The packet has a total length greater than 65,535 bytes.
  24. 3. Magnetic-strip information.
  25. 1. Network connections.
  26. 3. grep is case-sensitive by default.
  27. 1. Anti-static wristbands used during physical handling and 3. Storage in specialist storage facilities.
  28. 1. Creating a new file creates duplication and therefore may create update anomalies and 3. Creating a new file with the ">" command maintains the integrity of the original.
  29. 2. HTTP/1.1 503 Service Unavailable.
  30. 4. Reset the saved MAC addresses associated with the port.
  31. 3. Command and Control.
  32. 2. The netstat CLI command.
  33. 3. The data is being collected after translation has been applied on the outbound interface and before translation has been applied on the inbound interface.
  34. 3. Applying static NAT of one of the public addresses to the web server, pooling the other addresses for other users.
  35. 1. Actor: External: .Motive: Fun/.Variety: Unaffiliated.
  36. 2. To assert copyrights.
  37. 2. As directed by senior management.
  38. 2. Actions on objectives.
  39. 1. Confidentiality.
  40. 1. Actions on objectives.
  41. 1. Social.
  42. 2. PAN.
  43. 2. The greater than sign (>).
  44. 1. ICMP.
  45. 3. 0710.
  46. 3. Log file collation and normalization.
  47. 4. How can customer relations be improved?
  48. 3. The user-agent string appears to be running Internet Explorer, which isn't installed on the hosts.
  49. 3. Threat actors.
  50. 3. ps -e.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.190.18