What does these TTPs refer to?

Properly applied cyber threat intelligence to the SOC team help them in discovering TTPs. What does these TTPs refer to?A . Tactics, Techniques, and ProceduresB . Tactics, Threats, and ProceduresC . Targets, Threats, and ProcessD . Tactics, Targets, and ProcessView AnswerAnswer: A Explanation: Reference: https://www.crest-approved.org/wp-content/uploads/CREST-Cyber-Threat-Intelligence.pdf

March 25, 2021 No Comments READ MORE +

Which of the following tool can be used to filter web requests associated with the SQL Injection attack?

Which of the following tool can be used to filter web requests associated with the SQL Injection attack?A . NmapB . UrlScanC . ZAP proxyD . HydraView AnswerAnswer: B Explanation: Reference: https://aip.scitation.org/doi/pdf/10.1063/1.4982570

March 25, 2021 No Comments READ MORE +

What kind of threat intelligence described above?

The threat intelligence, which will help you, understand adversary intent and make informed decision to ensure appropriate security in alignment with risk. What kind of threat intelligence described above?A . Tactical Threat IntelligenceB . Strategic Threat IntelligenceC . Functional Threat IntelligenceD . Operational Threat IntelligenceView AnswerAnswer: B Explanation: Reference: https://www.blueliv.com/cyber-security-and-cyber-threat-intelligence-blog-blueliv/threat-intelligence/what-is-threat-intelligence/

March 22, 2021 No Comments READ MORE +

Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?

Which of the following data source can be used to detect the traffic associated with Bad Bot User-Agents?A . Windows Event LogB . Web Server LogsC . Router LogsD . Switch LogsView AnswerAnswer: B

March 22, 2021 No Comments READ MORE +

In which log collection mechanism, the system or application sends log records either on the local disk or over the network.

In which log collection mechanism, the system or application sends log records either on the local disk or over the network.A . rule-basedB . pull-basedC . push-basedD . signature-basedView AnswerAnswer: A

March 21, 2021 No Comments READ MORE +

According to the forensics investigation process, what is the next step carried out right after collecting the evidence?

According to the forensics investigation process, what is the next step carried out right after collecting the evidence?A . Create a Chain of Custody DocumentB . Send it to the nearby police stationC . Set a Forensic labD . Call Organizational Disciplinary TeamView AnswerAnswer: A

March 21, 2021 No Comments READ MORE +

Which of the log storage method arranges event logs in the form of a circular buffer?

Which of the log storage method arranges event logs in the form of a circular buffer?A . FIFOB . LIFOC . non-wrappingD . wrappingView AnswerAnswer: A Explanation: Reference: https://en.wikipedia.org/wiki/Circular_buffer

March 20, 2021 No Comments READ MORE +

This type of incident is categorized into?

David is a SOC analyst in Karen Tech. One day an attack is initiated by the intruders but David was not able to find any suspicious events. This type of incident is categorized into?A . True Positive IncidentsB . False positive IncidentsC . True Negative IncidentsD . False Negative IncidentsView...

March 19, 2021 No Comments READ MORE +

What is Ray and his team doing?

Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers. What is...

March 19, 2021 No Comments READ MORE +

Which SIEM deployment architecture will the organization adopt?

An organization wants to implement a SIEM deployment architecture. However, they have the capability to do only log collection and the rest of the SIEM functions must be managed by an MSSP. Which SIEM deployment architecture will the organization adopt?A . Cloud, MSSP ManagedB . Self-hosted, Jointly ManagedC . Self-hosted,...

March 17, 2021 No Comments READ MORE +