Which of the following threat intelligence helps cyber security professionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?

Which of the following threat intelligence helps cyber security professionals such as security operations managers, network operations center and incident responders to understand how the adversaries are expected to perform the attack on the organization, and the technical capabilities and goals of the attackers along with the attack vectors?A . Analytical Threat IntelligenceB ....

Continue reading

Where will Harley find the web server logs, if he wants to investigate them for any anomalies?

Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website. Where will Harley find the web server logs, if he wants to investigate them for any anomalies?A . SystemDrive%inetpublogsLogFilesW3SVCNB . SystemDrive%LogFilesinetpublogsW3SVCNC . %SystemDrive%LogFileslogsW3SVCND . SystemDrive% inetpubLogFileslogsW3SVCN View Answer Answer: A...

Continue reading

What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?

Bonney’s system has been compromised by a gruesome malware. What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?A . Complaint to police in a formal way regarding the incidentB . Turn off the infected machineC . Leave it to the network administrators to handleD...

Continue reading

What does these TTPs refer to?

Properly applied cyber threat intelligence to the SOC team help them in discovering TTPs. What does these TTPs refer to?A . Tactics, Techniques, and ProceduresB . Tactics, Threats, and ProceduresC . Targets, Threats, and ProcessD . Tactics, Targets, and Process View Answer Answer: A Explanation: Reference: https://www.crest-approved.org/wp-content/uploads/CREST-Cyber-Threat-Intelligence.pdf...

Continue reading