3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following service provides phishing protection and content filtering to manage the Internet experience on and off your network with the acceptable use or compliance policies?
Which of the following attack can be eradicated by converting all non-alphanumeric characters to HTML character entities before displaying the user input in search engines and forums?
Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?
Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.
What does this event log indicate?
What type of event is recorded when an application driver loads successfully in Windows?
Which of the following process refers to the discarding of the packets at the routing level without informing the source that the data did not reach its intended recipient?
Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?
Which of the following directory will contain logs related to printer access?
Which of the following steps of incident handling and response process focus on limiting the scope and extent of an incident?
Identify the type of attack, an attacker is attempting on www.example.com website.
Which of the following tool is used to recover from web application incident?
Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating files at /var/log/ wtmp.
What Chloe is looking at?
Which of the log storage method arranges event logs in the form of a circular buffer?
Which of the following technique involves scanning the headers of IP packets leaving a network to make sure
that the unauthorized or malicious traffic never leaves the internal network?
A type of threat intelligent that find out the information about the attacker by misleading them is known as
.
An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company’s URL as follows:
http://technosoft.com.com/ <script>alert("WARNING: The application has encountered an error");</script>. Identify the attack demonstrated in the above scenario.
Charline is working as an L2 SOC Analyst. One day, an L1 SOC Analyst escalated an incident to her for further investigation and confirmation. Charline, after a thorough investigation, confirmed the incident and assigned it with an initial priority.
What would be her next action according to the SOC workflow?
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
Which of the following attack inundates DHCP servers with fake DHCP requests to exhaust all available IP addresses?
Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?
Jane, a security analyst, while analyzing IDS logs, detected an event matching Regex /((\%3C)|<)((\%69)|i|(\% 49))((\%6D)|m|(\%4D))((\%67)|g|(\%47))[^\n]+((\%3E)|>)/|.
What does this event log indicate?
Which of the following threat intelligence helps cyber security professionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?
Which attack works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?