Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?
What does Windows event ID 4740 indicate?
Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?
Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
Which of the following directory will contain logs related to printer access?
Which of the following Windows features is used to enable Security Auditing in Windows?
Identify the type of attack, an attacker is attempting on website.
Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating files at /var/log/ wtmp.
What Chloe is looking at?
John, a threat analyst at GreenTech Solutions, wants to gather information about specific threats against the organization. He started collecting information from various sources, such as humans, social media, chat room, and so on, and created a report that contains malicious activity.
Which of the following types of threat intelligence did he use?
Rinni, SOC analyst, while monitoring IDS logs detected events shown in the figure below.
What does this event log indicate?
Which of the following is a set of standard guidelines for ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection?
What type of event is recorded when an application driver loads successfully in Windows?
Which of the following tool can be used to filter web requests associated with the SQL Injection attack?
In which log collection mechanism, the system or application sends log records either on the local disk or over the network.
Which attack works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?
John as a SOC analyst is worried about the amount of Tor traffic hitting the network. He wants to prepare a dashboard in the SIEM to get a graph to identify the locations from where the TOR traffic is coming.
Which of the following data source will he use to prepare the dashboard?
Which of the following factors determine the choice of SIEM architecture?
A type of threat intelligent that find out the information about the attacker by misleading them is known as
.
Which of the following is a default directory in a Mac OS X that stores security-related logs?
Wesley is an incident handler in a company named Maddison Tech. One day, he was learning techniques for eradicating the insecure deserialization attacks.
What among the following should Wesley avoid from considering?
Which of the following can help you eliminate the burden of investigating false positives?
Which of the following Windows event is logged every time when a user tries to access the "Registry" key?
Mike is an incident handler for PNP Infosystems Inc. One day, there was a ticket raised regarding a critical incident and Mike was assigned to handle the incident. During the process of incident handling, at one stage, he has performed incident analysis and validation to check whether the incident is a true incident or a false positive.
Identify the stage in which he is currently in.
Jane, a security analyst, while analyzing IDS logs, detected an event matching Regex /((\%3C)|<)((\%69)|i|(\% 49))((\%6D)|m|(\%4D))((\%67)|g|(\%47))[^\n]+((\%3E)|>)/|.
What does this event log indicate?
The Syslog message severity levels are labelled from level 0 to level 7.
What does level 0 indicate?
An attacker exploits the logic validation mechanisms of an e-commerce website. He successfully purchases a product worth $100 for $10 by modifying the URL exchanged between the client and the server.
Original URL: &debit=100 Modified URL: &debit=10
Identify the attack depicted in the above scenario.
Which of the following formula represents the risk?
Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.
Where will Harley find the web server logs, if he wants to investigate them for any anomalies?
What is the process of monitoring and capturing all data packets passing through a given network using different tools?