<< Prev Question Next Question >>

Question 99/167

An engineer needs to configure network systems to detect command and control communications by decrypting ingress and egress perimeter traffic and allowing network security devices to detect malicious outbound communications. Which technology should be used to accomplish the task?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (167q)
Question 1: What are two differences of deep packet inspection compared ...
Question 2: An analyst discovers that a legitimate security alert has be...
Question 3: (Exhibit) Refer to the exhibit. A network engineer received ...
Question 4: What is the practice of giving an employee access to only th...
Question 5: Refer to the exhibit. (Exhibit) What information is depicted...
Question 6: Drag and drop the elements from the left into the correct or...
Question 7: A threat actor penetrated an organization's network. Using t...
Question 8: Refer to the exhibit. (Exhibit) Which application-level prot...
Question 9: Which category relates to improper use or disclosure of PII ...
Question 10: What is the impact of false positive alerts on business comp...
Question 11: What causes events on a Windows system to show Event Code 46...
Question 12: (Exhibit) Refer to the exhibit Drag and drop the element nam...
Question 13: Refer to the exhibit. (Exhibit) An attacker gained initial a...
Question 14: An engineer receives a security alert that traffic with a kn...
Question 15: What is the practice of giving employees only those permissi...
Question 16: How does an attacker observe network traffic exchanged betwe...
Question 17: What is the difference between the ACK flag and the RST flag...
Question 18: Which filter allows an engineer to filter traffic in Wiresha...
Question 19: At a company party a guest asks questions about the company'...
Question 20: What is the difference between deep packet inspection and st...
Question 21: What describes the impact of false-positive alerts compared ...
Question 22: What is the difference between vulnerability and risk?...
Question 23: What is an incident response plan?...
Question 24: Which vulnerability type is used to read, write, or erase in...
Question 25: A network engineer noticed in the NetFlow report that intern...
Question 26: An employee received an email from a colleague's address ask...
Question 27: How does an attack surface differ from an attack vector?...
Question 28: Which technique obtains information about how the system wor...
Question 29: Which type of data must an engineer capture to analyze paylo...
Question 30: What is the functionality of an IDS'?...
Question 31: What is an advantage of symmetric over asymmetric encryption...
Question 32: What is the communication channel established from a comprom...
Question 33: Refer to the exhibit. (Exhibit) Which alert is identified fr...
Question 34: An analyst is investigating a host in the network that appea...
Question 35: Refer to the exhibit. (Exhibit) Which kind of attack method ...
Question 36: An analyst is investigating an incident in a SOC environment...
Question 37: Refer to the exhibit. (Exhibit) Which frame numbers contain ...
Question 38: Refer to the exhibit. (Exhibit) In which Linux log file is t...
Question 39: Refer to the exhibit. (Exhibit) Which attack is being attemp...
Question 40: What is a collection of compromised machines that attackers ...
Question 41: (Exhibit) Refer to the exhibit. An engineer must use a 5-tup...
Question 42: A user received a malicious attachment but did not run it. W...
Question 43: (Exhibit) Refer to the exhibit Which TLS version does this c...
Question 44: Refer to the exhibit. (Exhibit) An engineer is analyzing thi...
Question 45: Which technology assures that the information transferred fr...
Question 46: A security engineer notices confidential data being exfiltra...
Question 47: Refer to the exhibit. (Exhibit) What is the potential threat...
Question 48: What is the difference between vulnerability and risk?...
Question 49: Which security principle requires more than one person is re...
Question 50: Refer to the exhibit. (Exhibit) Which tool was used to gener...
Question 51: Which principle is being followed when an analyst gathers in...
Question 52: Refer to the exhibit. (Exhibit) What is occurring within the...
Question 53: What is the function of a command and control server?...
Question 54: During which phase of the forensic process is data that is r...
Question 55: What is the difference between the ACK flag and the RST flag...
Question 56: An engineer is analyzing a recent breach where confidential ...
Question 57: What should an engineer use to aid the trusted exchange of p...
Question 58: Which tool provides a full packet capture from network traff...
Question 59: (Exhibit) Refer to the exhibit. Where is the executable file...
Question 60: What is the difference between mandatory access control (MAC...
Question 61: If a web server accepts input from the user and passes it to...
Question 62: A user reports difficulties accessing certain external web p...
Question 63: What is the difference between inline traffic interrogation ...
Question 64: Refer to the exhibit. (Exhibit) A workstation downloads a ma...
Question 65: What do host-based firewalls protect workstations from?...
Question 66: (Exhibit) Refer to the exhibit A penetration tester runs the...
Question 67: A system administrator is ensuring that specific registry in...
Question 68: Which type of verification consists of using tools to comput...
Question 69: Refer to the exhibit. (Exhibit) What is occurring?...
Question 70: Which type of attack is a blank email with the subject "pric...
Question 71: What is the impact of false positive alerts on business comp...
Question 72: Drag and drop the security concept from the left onto the ex...
Question 73: Refer to the exhibit. (Exhibit) What is the potential threat...
Question 74: In a SOC environment, what is a vulnerability management met...
Question 75: Which of these is a defense-in-depth strategy principle?...
Question 76: What are two denial of service attacks? (Choose two.)...
Question 77: Which security monitoring data type is associated with appli...
Question 78: Which piece of information is needed for attribution in an i...
Question 79: Which open-sourced packet capture tool uses Linux and Mac OS...
Question 80: Which type of data is used to detect anomalies in the networ...
Question 81: What are two differences and benefits of packet filtering, s...
Question 82: Which security model assumes an attacker within and outside ...
Question 83: Which type of attack occurs when an attacker is successful i...
Question 84: How is symmetric encryption used for HTTPS connections?...
Question 85: Drag and drop the event term from the left onto the descript...
Question 86: What matches the regular expression c(rgr)+e?...
Question 87: Which two protocols are used for DDoS amplification attacks?...
Question 88: What is the purpose of command and control for network-aware...
Question 89: What are the two differences between vulnerability and explo...
Question 90: An engineer runs a suspicious file in a sandbox analysis too...
Question 91: What is the difference between a threat and a risk?...
Question 92: Refer to the exhibit. (Exhibit) Drag and drop the element na...
Question 93: The security team has detected an ongoing spam campaign targ...
Question 94: How is NetFlow different from traffic mirroring?...
Question 95: Which signature impacts network traffic by causing legitimat...
Question 96: A member of the SOC team is checking the dashboard provided ...
Question 97: An engineer is working on a ticket for an incident from the ...
Question 98: Which two components reduce the attack surface on an endpoin...
Question 99: An engineer needs to configure network systems to detect com...
Question 100: A suspicious user opened a connection from a compromised hos...
Question 101: An offline audit log contains the source IP address of a ses...
Question 102: What is a scareware attack?
Question 103: One of the objectives of information security is to protect ...
Question 104: Drag and drop the technology on the left onto the data type ...
Question 105: What is the difference between the rule-based detection when...
Question 106: Which type of attack uses a botnet to reflect requests off o...
Question 107: What is a difference between tampered and untampered disk im...
Question 108: Which evasion technique is indicated when an intrusion detec...
Question 109: An analyst is exploring the functionality of different opera...
Question 110: Refer to the exhibit. (Exhibit) Which type of evidence is th...
Question 111: What is an example of social engineering attacks?...
Question 112: Which type of data collection requires the largest amount of...
Question 113: Which tool gives the ability to see session data in real tim...
Question 114: What is the impact of encryption?...
Question 115: What is a Heartbleed vulnerability?...
Question 116: Refer to the exhibit (Exhibit) An engineer is analyzing DNS ...
Question 117: Which statement describes patch management?...
Question 118: What is the difference between discretionary access control ...
Question 119: Refer to the exhibit. (Exhibit) Which field contains DNS hea...
Question 120: Which step in the incident response process researches an at...
Question 121: Refer to the exhibit. (Exhibit) What does this Cuckoo sandbo...
Question 122: An engineer needs to discover alive hosts within the 192.168...
Question 123: Refer to the exhibit. (Exhibit) A company's user HTTP connec...
Question 124: An intruder attempted malicious activity and exchanged email...
Question 125: An engineer received a flood of phishing emails from HR with...
Question 126: What is the principle of defense-in-depth?...
Question 127: Which event artifact is used to identify HTTP GET requests f...
Question 128: Which metric is used to capture the level of access needed t...
Question 129: Which attack method is being used when an attacker tries to ...
Question 130: Which action matches the weaponization step of the Cyber Kil...
Question 131: Syslog collecting software is installed on the server For th...
Question 132: Refer to exhibit. (Exhibit) An analyst performs the analysis...
Question 133: A forensic investigator is analyzing a recent breach case. A...
Question 134: According to the NIST SP 800-86. which two types of data are...
Question 135: Which two elements of the incident response process are stat...
Question 136: Refer to the exhibit. (Exhibit) This request was sent to a w...
Question 137: What is sliding window anomaly detection?...
Question 138: A security engineer must determine why a new core applicatio...
Question 139: Drag and drop the security concept on the left onto the exam...
Question 140: Refer to the exhibit. (Exhibit) What does this output indica...
Question 141: An engineer must configure network systems to detect command...
Question 142: A SOC analyst detected connections to known C&amp;C and port...
Question 143: Refer to the exhibit. (Exhibit) A security analyst is invest...
Question 144: An engineer discovered a breach, identified the threat's ent...
Question 145: Which utility blocks a host portscan?...
Question 146: A security specialist is investigating an incident regarding...
Question 147: According to CVSS, what is attack complexity?...
Question 148: Which data capture includes payload and header information?...
Question 149: Refer to the exhibit. (Exhibit) Which stakeholders must be i...
Question 150: A malicious file has been identified in a sandbox analysis t...
Question 151: An engineer needs to fetch logs from a proxy server and gene...
Question 152: What is a difference between SOAR and SIEM?...
Question 153: A security expert is working on a copy of the evidence, an I...
Question 154: Refer to the exhibit. (Exhibit) Which component is identifia...
Question 155: (Exhibit) Refer to the exhibit. A SOC analyst is examining t...
Question 156: An engineer must compare NIST vs ISO frameworks The engineer...
Question 157: What is a difference between SI EM and SOAR security systems...
Question 158: According to CVSS, what is a description of the attack vecto...
Question 159: What is the difference between an attack vector and attack s...
Question 160: What is the difference between the ACK flag and the RST flag...
Question 161: An analyst performs traffic analysis to detect data exfiltra...
Question 162: The SOC team detected an ongoing port scan. After investigat...
Question 163: What is the role of indicator of compromise in an investigat...
Question 164: Which action should be taken if the system is overwhelmed wi...
Question 165: According to the September 2020 threat intelligence feeds a ...
Question 166: What is the dataflow set in the NetFlow flow-record format?...
Question 167: What are the two differences between stateful and deep packe...