Question 1

Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain.
Which of the following tools would aid her to decipher the network traffic?
  • Question 2

    A security analyst is conducting a vulnerability scan and comes across a scheduled task that runs a batch script The analyst sees the following text when viewing the batch script s contents:

    Which of the following is the MOST likely reason for the analyst to flag this task?
  • Question 3

    An auditor wants to test the security posture of an organization by running a tool that will display the following:

    Which of the following commands should be used?
  • Question 4

    A retail executive recently accepted a job with a major competitor. The following week, a security analyst reviews the security logs and Identifies successful logon attempts to access the departed executive's accounts. Which of the following security practices would have addressed the issue?
  • Question 5

    Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened. The network and security teams perform the following actions:
    Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the incident response process?