Question 6

In which of the following incident handling and response stages, the root cause of the incident must be found from the forensic results?
  • Question 7

    John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(\.|(%|%25)2E)(\.|(%|%25)2E)(\/|(%|%25)2F|\\|(%|%25)5C)/i.
    What does this event log indicate?
  • Question 8

    John, SOC analyst wants to monitor the attempt of process creation activities from any of their Windows endpoints.
    Which of following Splunk query will help him to fetch related logs associated with process creation?
  • Question 9

    An attacker exploits the logic validation mechanisms of an e-commerce website. He successfully purchases a product worth $100 for $10 by modifying the URL exchanged between the client and the server.
    Original
    URL: http://www.buyonline.com/product.aspx?profile=12
    &debit=100
    Modified URL: http://www.buyonline.com/product.aspx?profile=12
    &debit=10
    Identify the attack depicted in the above scenario.
  • Question 10

    Which of the following formula represents the risk?