Question 121

What is rule-based detection when compared to statistical detection?
  • Question 122

    Which two elements are used for profiling a network? (Choose two.)
  • Question 123

    An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture the analyst cannot determine the technique and payload used for the communication.

    Which obfuscation technique is the attacker using?
  • Question 124

    An organization's security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning How should the analyst collect the traffic to isolate the suspicious host?
  • Question 125

    Drag and drop the access control models from the left onto the correct descriptions on the right.