Which regular expression is needed to capture the IP address 192.168.20.232?
Correct Answer:
A
Refer to the exhibit.
An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?
Correct Answer:
C
Indirect=circumstantail so there is no posibility to match A or B (only one answer is needed in this question). For suer it's not a BEST evidence - this FW data inform only of DROPPED traffic. If smth happend inside network, presented evidence could be used to support other evidences or make our narreation stronger but alone it's mean nothing.
In a SOC environment, what is a vulnerability management metric?
Correct Answer:
C
Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)
Correct Answer:
AB
The security team has detected an ongoing spam campaign targeting the organization. The team's approach is to push back the cyber kill chain and mitigate ongoing incidents. At which phase of the cyber kill chain should the security team mitigate this type of attack?
Correct Answer:
B