In which of the following incident handling and response stages, the root cause of the incident must be found from the forensic results?
Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?
Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown:
http://www.terabytes.com/process.php./../../../../etc/passwd
Jane, a security analyst, while analyzing IDS logs, detected an event matching Regex /((\%3C)|<)((\%69)|i|(\% 49))((\%6D)|m|(\%4D))((\%67)|g|(\%47))[^\n]+((\%3E)|>)/|.
What does this event log indicate?
Which of the following tool is used to recover from web application incident?
Which of the following formula represents the risk levels?
If the SIEM generates the following four alerts at the same time:
I.Firewall blocking traffic from getting into the network alerts
II.SQL injection attempt alerts
III.Data deletion attempt alerts
IV.Brute-force attempt alerts
Which alert should be given least priority as per effective alert triaging?
Identify the HTTP status codes that represents the server error.
Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers.
What is Ray and his team doing?
Which of the following directory will contain logs related to printer access?
Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an event matching regex /\\w*((\%27)|(\’))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.
What does this event log indicate?
Which of the following formula is used to calculate the EPS of the organization?
Which of the following stage executed after identifying the required event sources?
David is a SOC analyst in Karen Tech. One day an attack is initiated by the intruders but David was not able to find any suspicious events.
This type of incident is categorized into?
Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?
What does HTTPS Status code 403 represents?
Which of the following attack inundates DHCP servers with fake DHCP requests to exhaust all available IP addresses?
Which of the following can help you eliminate the burden of investigating false positives?
Which of the following attack can be eradicated by disabling of "allow_url_fopen and allow_url_include" in the php.ini file?
Which of the following factors determine the choice of SIEM architecture?
Which of the following threat intelligence is used by a SIEM for supplying the analysts with context and "situational awareness" by using threat actor TTPs, malware campaigns, tools used by threat actors.
1.Strategic threat intelligence
2.Tactical threat intelligence
3.Operational threat intelligence
4.Technical threat intelligence
According to the forensics investigation process, what is the next step carried out right after collecting the evidence?
Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?
According to the Risk Matrix table, what will be the risk level when the probability of an attack is very high, and the impact of that attack is major?
NOTE: It is mandatory to answer the question before proceeding to the next one.
Shawn is a security manager working at Lee Inc Solution. His organization wants to develop threat intelligent strategy plan. As a part of threat intelligent strategy plan, he suggested various components, such as threat intelligence requirement analysis, intelligence and collection planning, asset identification, threat reports, and intelligence buy-in.
Which one of the following components he should include in the above threat intelligent strategy plan to make it effective?
The Syslog message severity levels are labelled from level 0 to level 7.
What does level 0 indicate?
Identify the attack, where an attacker tries to discover all the possible information about a target network before launching a further attack.
Which of the following is a correct flow of the stages in an incident handling and response (IH&R) process?
Which of the following attack can be eradicated by filtering improper XML syntax?