Where are the browser page rendering permissions displayed?DRAG DROP Drag and drop the type of attacks from the left onto the cyber kill chain stages at which the attacks are seen on the right.
malware placed on the targeted system → weaponization
not visible to the victim → delivery
large amount of data leaving the network through unusual ports → exploitation
USB with infected files inserted into company laptop → installation
virus scanner turning off → command & control
open port scans and multiple failed logins from the website → actions on objectives
I matched 'large amount of data leaving the network through unusual ports' with actions on objectives and 'open port scans and multiple failed logins from the website' to exploitation. I figured data exfiltration is usually the final goal, so it fits actions on objectives. Not fully sure since some reports show open scans as recon or exploitation. Open to debate here.
DRAG DROP Drag and drop the function on the left onto the mechanism on the right.
DRAG DROP Drag and drop the NIST incident response process steps from the left onto the actions that occur in the steps on the right.
Pretty sure this one follows the NIST order: Prepare goes with employee training, Analyze to identifying how/where the breach was hit, Contain is about stopping it from spreading, Eradicate is root cause removal, Recover is restoring ops, and Post-Incident Handling is for improving after. I matched based on that process. Anyone disagree?
- Conduct incident response role training for employees → Prepare
- Determine how the breach was discovered and the areas that were impacted → Analyze
- Determine where it started and prevent spread → Contain
- Eliminate root cause and update system → Eradicate
- Get ops going, prevent recurrence → Recover
- Analyze/document/strengthen after attack → Post-Incident Handling
Nice and clear question layout. Mapping is:
Analyze and document the breach, and strengthen systems against future attacks → Post-Incident Handling
Conduct incident response role training for employees → Prepare
Determine where the breach started and prevent the attack from spreading → Contain
Determine how the breach was discovered and the areas that were impacted → Analyze
Eliminate the root cause of the breach and app updates to the system → Eradicate
Get systems and business operations up and running, and ensure that the same type of attack does not occur again → Recover
DRAG DROP Refer to the exhibit. 
Yeah, for incidents like this Stealthwatch alert, you really want to do the search and investigation steps before jumping into containment. So it's: Search for infected hosts → Investigate infected hosts → Investigate and classify the exposure → Examine returned results → Execute rapid threat containment. Makes sense given you need to know what you're dealing with first. If anyone has seen a scenario where you'd contain right away, let me know.
DRAG DROP Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right.
DRAG DROP Drag and drop the cloud computing service descriptions from the left onto the cloud service categories on the right.
DRAG DROP Drag and drop the components from the left onto the phases of the CI/CD pipeline on the right.
Is the question asking for the traditional order of CI/CD pipeline phases, or do we need to match the phases based on a specific Cisco DevSecOps model shown in that linked image? The mapping could change depending on which convention they're testing.






