What is the IOC threat and URL in this STIX JSON snippet?Q: 11
Refer to the exhibit.
What is the IOC threat and URL in this STIX JSON snippet?
What is the IOC threat and URL in this STIX JSON snippet?Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
In a secure government communication network, an automated alert indicates the presence of
anomalous DLL files injected into the system memory during a routine update of communication
protocols. These DLL files are exhibiting beaconing behavior to a satellite IP known for signal
interception risks. Concurrently, there is an uptick in encrypted traffic volumes that suggests possible
data exfiltration. Which set of actions should the security engineer prioritize?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
Refer to the exhibit.


Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
Refer to the exhibit.
A security analyst is reviewing alerts from the SIEM system that was just implemented and notices a
possible indication of an attack because the SSHD system just went live and there should be nobody
using it. Which action should the analyst take to respond to the alert?
A security analyst is reviewing alerts from the SIEM system that was just implemented and notices a
possible indication of an attack because the SSHD system just went live and there should be nobody
using it. Which action should the analyst take to respond to the alert?Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
A scanner detected a malware-infected file on an endpoint that is attempting to beacon to an
external site. An analyst has reviewed the IPS and SIEM logs but is unable to identify the file’s
behavior. Which logs should be reviewed next to evaluate this file further?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
An insider scattered multiple USB flash drives with zero-day malware in a company HQ building.
Many employees connected the USB flash drives to their workstations. An attacker was able to get
access to endpoints from outside, steal user credentials, and exfiltrate confidential information from
internal web resources. Which two steps prevent these types of security incidents in the future?
(Choose two.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Refer to the exhibit.
What should be determined from this Apache log?
What should be determined from this Apache log?Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
Over the last year, an organization’s HR department has accessed data from its legal department on
the last day of each month to create a monthly activity report. An engineer is analyzing suspicious
activity alerted by a threat intelligence platform that an authorized user in the HR department has
accessed legal data daily for the last week. The engineer pulled the network data from the legal
department’s shared folders and discovered above average-size data dumps. Which threat actor is
implied from these artifacts?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Refer to the exhibit.
An engineer is analyzing a TCP stream in Wireshark after a suspicious email with a URL. What should
be determined about the SMB traffic from this stream?
An engineer is analyzing a TCP stream in Wireshark after a suspicious email with a URL. What should
be determined about the SMB traffic from this stream?Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
A cybersecurity analyst is examining a complex dataset of threat intelligence information from
various sources. Among the data, they notice multiple instances of domain name resolution requests
to suspicious domains known for hosting C2 servers. Simultaneously, the intrusion detection system
logs indicate a series of network anomalies, including unusual port scans and attempts to exploit
known vulnerabilities. The internal logs also reveal a sudden increase in outbound network traffic
from a specific internal host to an external IP address located in a high-risk region. Which action
should be prioritized by the organization?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2