Question 1

Refer to the exhibit.

An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?
  • Question 2

    What is the steganography anti-forensics technique?
  • Question 3

    An "unknown error code" is appearing on an ESXi host during authentication. An engineer checks the authentication logs but is unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file the engineer should check to continue troubleshooting this error?
  • Question 4

    Refer to the exhibit.

    A security analyst notices unusual connections while monitoring traffic. What is the attack vector, and which action should be taken to prevent this type of event?
  • Question 5

    Drag and drop the cloud characteristic from the left onto the challenges presented for gathering evidence on the right.