Question 46

Refer to the exhibit.

Which type of log is displayed?
  • Question 47

    A security engineer notices confidential data being exfiltrated to a domain "Ranso4134-mware31-895" address that is attributed to a known advanced persistent threat group The engineer discovers that the activity is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Cyber Kill Chain?
  • Question 48

    Refer to the exhibit.

    Which packet contains a file that is extractable within Wireshark?
  • Question 49

    A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.
    Which type of evidence is this?
  • Question 50

    Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?