Q: 11
What does HTTPS Status code 403 represents?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Which of the following technique involves scanning the headers of IP packets leaving a network to
make sure
that the unauthorized or malicious traffic never leaves the internal network?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
Which of the following data source will a SOC Analyst use to monitor connections to the insecure
ports?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
Which of the following directory will contain logs related to printer access?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
Identify the password cracking attempt involving a precomputed dictionary of plaintext passwords
and their corresponding hash values to crack the password.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
According to the Risk Matrix table, what will be the risk level when the probability of an attack is very
high, and the impact of that attack is major?
NOTE: It is mandatory to answer the question before proceeding to the next one.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Peter, a SOC analyst with Spade Systems, is monitoring and analyzing the router logs of the company
and wanted to check the logs that are generated by access control list numbered 210.
What filter should Peter add to the 'show logging' command to get the required output?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
Identify the attack, where an attacker tries to discover all the possible information about a target
network before launching a further attack.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Charline is working as an L2 SOC Analyst. One day, an L1 SOC Analyst escalated an incident to her for
further investigation and confirmation. Charline, after a thorough investigation, confirmed the
incident and assigned it with an initial priority.
What would be her next action according to the SOC workflow?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2