Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server?

An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server?A . Hard diskB . Primary boot partitionC...

March 23, 2024 No Comments READ MORE +

Which of the following actions will an attacker be able to initiate directly against this host?

Given the Nmap request below: Which of the following actions will an attacker be able to initiate directly against this host?A . Password sniffingB . ARP spoofingC . A brute-force attackD . An SQL injectionView AnswerAnswer: C Explanation: The Nmap command given in the question performs a TCP SYN scan...

March 23, 2024 No Comments READ MORE +

Which of the following scripting languages was used in the script?

A security analyst recently joined the team and is trying to determine which scripting language is being used in a production script to determine if it is malicious. Given the following script: Which of the following scripting languages was used in the script?A . PowerShelB . RubyC . PythonD ....

March 23, 2024 No Comments READ MORE +