Which tasks would a First Responder perform during the Identification phase of Incident Response?
Why would the pass action be used in a Snort configuration file?
What should happen before acquiring a bit-for-bit copy of suspect media during incident response?
Michael, a software engineer, added a module to a banking customer’s code. The new module deposits small amounts of money into his personal bank account. Michael has access to edit the code, but only code reviewers have the ability to commit modules to production. The code reviewers have a backlog of work, and are often willing to trust the software developers’ testing and confidence in the code.
Which technique is Michael most likely to engage to implement the malicious code?
Which of the following would be included in a router configuration standard?
How does data classification help protect against data loss?
What piece of information would be recorded by the first responder as part of the initial System Description?
What is the most common read-only SNMP community string usually called?
Network administrators are often hesitant to patch the operating systems on CISCO router and switch operating systems, due to the possibility of causing network instability, mainly because of which of the following?
Which of the following is an SNMPv3 security feature that was not provided by earlier versions of the protocol?
If a Cisco router is configured with the “service config” configuration statement, which of the following tools could be used by an attacker to apply a new router configuration?
An analyst will capture traffic from an air-gapped network that does not use DNS. The analyst is looking for unencrypted Syslog data being transmitted. Which of the following is most efficient for this purpose?
Which of the following is best defined as “anything that has the potential to target known or existing vulnerabilities in a system?”