A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?
Which action matches the weaponization step of the Cyber Kill Chain Model?
An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.
Which obfuscation technique is the attacker using?
How does agentless monitoring differ from agent-based monitoring?
What ate two categories of DDoS attacks? (Choose two.)
When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?
What is a difference between SIEM and SOAR?
An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?
Which tool provides a full packet capture from network traffic?
PDF + Testing Engine
|
---|
$70 |
Testing Engine
|
---|
$54 |
PDF (Q&A)
|
---|
$46 |
Cisco Free Exams |
---|
![]() |