Which of the following are legally compliant forensics applications that will detect an alternative data stream (ADS) or a file with an incorrect file extension? (Choose two.)
Correct Answer:
BD
After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?
Correct Answer:
C
Which of the following is a cybersecurity solution for insider threats to strengthen information protection?
Correct Answer:
B
During which of the following attack phases might a request sent to port 1433 over a whole company network be seen within a log?
Correct Answer:
B
An incident at a government agency has occurred and the following actions were taken:
-Users have regained access to email accounts
-Temporary VPN services have been removed
-Host-based intrusion prevention system (HIPS) and antivirus (AV) signatures have been updated
-Temporary email servers have been decommissioned
Which of the following phases of the incident response process match the actions taken?
Correct Answer:
A