Question 26

Identify the attack, where an attacker tries to discover all the possible information about a target network before launching a further attack.
  • Question 27

    Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?
  • Question 28

    Jane, a security analyst, while analyzing IDS logs, detected an event matching Regex
    /((\%3C)|<)((\%69)|i|(\% 49))((\%6D)|m|(\%4D))((\%67)|g|(\%47))[^\n]+((\%3E)|>)/|.
    What does this event log indicate?
  • Question 29

    Bonney's system has been compromised by a gruesome malware.
    What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
  • Question 30

    An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company's URL as follows:
    http://technosoft.com.com/<script>alert("WARNING: The application has encountered an error");</script>.
    Identify the attack demonstrated in the above scenario.