What is the difference between the rule-based detection when compared to behavioral detection?
Correct Answer:
D
What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?
Correct Answer:
A
According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?
Correct Answer:
B
During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?
Correct Answer:
C
How does an attack surface differ from an attack vector?
Correct Answer:
B