Question 121

A security expert is working on a copy of the evidence, an ISO file that is saved in CDFS format. Which type of evidence is this file?
  • Question 122

    What is a difference between signature-based and behavior-based detection?
  • Question 123

    An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?
  • Question 124

    How is NetFlow different from traffic mirroring?
  • Question 125

    An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
    Which testing method did the intruder use?