Which technology should be used to implement a solution that makes routing decisions based on HTTP header, uniform resource identifier, and SSL session ID attributes?
What is a comparison between rule-based and statistical detection?
A network engineer noticed in the NetFlow report that internal hosts are sending many DNS requests to external DNS servers A SOC analyst checked the endpoints and discovered that they are infected and became part of the botnet Endpoints are sending multiple DNS requests but with spoofed IP addresses of valid external sources What kind of attack are infected endpoints involved in1?
Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)
Which security technology allows only a set of pre-approved applications to run on a system?
An organization is cooperating with several third-party companies. Data exchange is on an unsecured channel using port 80 Internal employees use the FTP service to upload and download sensitive data An engineer must ensure confidentiality while preserving the integrity of the communication. Which technology must the engineer implement in this scenario'?
An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?
During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?
Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS servers via DHCP Which type of attack is occurring?
What is the impact of false positive alerts on business compared to true positive?
PDF + Testing Engine
|
---|
$70 |
Testing Engine
|
---|
$54 |
PDF (Q&A)
|
---|
$46 |
Cisco Free Exams |
---|
![]() |