Question 6

Bonney's system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
  • Question 7

    A type of threat intelligent that find out the information about the attacker by misleading them is known as
    .
  • Question 8

    Which of the following tool can be used to filter web requests associated with the SQL Injection attack?
  • Question 9

    Which of the following are the responsibilities of SIEM Agents?
    1.Collecting data received from various devices sending data to SIEM before forwarding it to the central engine.
    2.Normalizing data received from various devices sending data to SIEM before forwarding it to the central engine.
    3.Co-relating data received from various devices sending data to SIEM before forwarding it to the central engine.
    4.Visualizing data received from various devices sending data to SIEM before forwarding it to the central engine.
  • Question 10

    Which of the log storage method arranges event logs in the form of a circular buffer?