Question 1
Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain.
Which of the following tools would aid her to decipher the network traffic?
Which of the following tools would aid her to decipher the network traffic?
Question 2
A security analyst is conducting a vulnerability scan and comes across a scheduled task that runs a batch script The analyst sees the following text when viewing the batch script s contents:

Which of the following is the MOST likely reason for the analyst to flag this task?

Which of the following is the MOST likely reason for the analyst to flag this task?
Question 3
An auditor wants to test the security posture of an organization by running a tool that will display the following:

Which of the following commands should be used?

Which of the following commands should be used?
Question 4
A retail executive recently accepted a job with a major competitor. The following week, a security analyst reviews the security logs and Identifies successful logon attempts to access the departed executive's accounts. Which of the following security practices would have addressed the issue?
Question 5
Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened. The network and security teams perform the following actions:
Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the incident response process?
Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the incident response process?