Question 31

Which of the following tool is used to recover from web application incident?
  • Question 32

    Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?
  • Question 33

    John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(\.|(%|%25)2E)(\.|(%|%25)2E)(\/|(%|%25)2F|\\|(%|%25)5C)/i.
    What does this event log indicate?
  • Question 34

    Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?
  • Question 35

    Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown:
    http://www.terabytes.com/process.php./../../../../etc/passwd