Question 211

A security analyst is reviewing packet captures from a system that was compromised. The system was already isolated from the network, but it did have network access for a few hours after being compromised. When viewing the capture in a packet analyzer, the analyst sees the following:

Which of the following can the analyst conclude?
  • Question 212

    A security analyst has received information from a third-party intelligence-sharing resource that indicates employee accounts were breached.
    Which of the following is the NEXT step the analyst should take to address the issue?
  • Question 213

    A company's blocklist has outgrown the current technologies in place. The ACLS are at maximum, and the IPS signatures only allow a certain amount of space for domains to be added, creating the need for multiple signatures.
    Which of the following configuration changes to the existing controls would be the MOST appropriate to improve performance?
  • Question 214

    An analyst wants to use a command line tool to identify open ports and running services on a host along with the application that is associated with those services and port.
    Which of the following should the analyst use?
  • Question 215

    Which of the following is a switch attack?