Refer to the exhibit.
In which Linux log file is this output found?
Correct Answer:
D
A user received an email attachment named "Hr405-report2609-empl094.exe" but did not run it. Which category of the cyber kill chain should be assigned to this type of event?
Correct Answer:
D
Refer to the exhibit.
What is occurring in this network traffic?
Correct Answer:
D
What is a difference between signature-based and behavior-based detection?
Correct Answer:
B
Instead of searching for patterns linked to specific types of attacks, behavior-based IDS solutions monitor behaviors that may be linked to attacks, increasing the likelihood of identifying and mitigating a malicious action before the network is compromised.
https://accedian.com/blog/what-is-the-difference-between-signature-based-and-behavior-based-ids/
Which security model assumes an attacker within and outside of the network and enforces strict verification
before connecting to any system or resource within the organization?
Correct Answer:
D
Zero Trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter.