Question 176

A cyberthreat intelligence analyst is gathering data about a specific adversary using OSINT techniques. Which of the following should the analyst use?
  • Question 177

    After a ransomware attack a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?
  • Question 178

    A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server:

    Which of the following BEST describes this kind of attack?
  • Question 179

    A smart retail business has a local store and a newly established and growing online storefront. A recent storm caused a power outage to the business and the local ISP, resulting in several hours of lost sales and delayed order processing. The business owner now needs to ensure two things:
    * Protection from power outages
    * Always-available connectivity In case of an outage
    The owner has decided to implement battery backups for the computer equipment Which of the following would BEST fulfill the owner's second need?
  • Question 180

    Which of the following describes the BEST approach for deploying application patches?