Which system monitors local system operation and local network access for violations of a security policy?
Correct Answer:
A
HIDS is capable of monitoring the internals of a computing system as well as the network packets on its network interfaces. Host-based firewall is a piece of software running on a single Host that can restrict incoming and outgoing Network activity for that host only.
What is a benefit of using asymmetric cryptography?
Correct Answer:
C
Which piece of information is needed for attribution in an investigation?
Correct Answer:
C
Actually this is the most important thing: know who, what, how, why, etc.. attack the network.
An engineer runs a suspicious file in a sandbox analysis tool to see the outcome. The analysis report shows that outbound callouts were made post infection.
Which two pieces of information from the analysis report are needed to investigate the callouts? (Choose two.)
Correct Answer:
BE
A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?
Correct Answer:
B