Question 111

Drag and drop the security concept on the left onto the example of that concept on the right.

Question 112

Which evasion technique is indicated when an intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources?
  • Question 113

    According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?
  • Question 114

    How does a certificate authority impact security?
  • Question 115

    An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group.
    What is the initial event called in the NIST SP800-61?