What is a difference between tampered and untampered disk images?
Correct Answer:
D
The disk image must be intact for forensics analysis. As a cybersecurity professional, you may be given the task of capturing an image of a disk in a forensic manner. Imagine a security incident has occurred on a system and you are required to perform some forensic investigation to determine who and what caused the attack. Additionally, you want to ensure the data that was captured is not tampered with or modified during the creation of a disk image process. Ref: Cisco Certified CyberOps Associate 200-201 Certification Guide
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?
Correct Answer:
D
What makes HTTPS traffic difficult to monitor?
Correct Answer:
D
Refer to the exhibit.
Which kind of attack method is depicted in this string?
Correct Answer:
A
Which piece of information is needed for attribution in an investigation?
Correct Answer:
C
Actually this is the most important thing: know who, what, how, why, etc.. attack the network.