- (Exam Topic 3)
A security analyst observes a large amount of scanning activity coming from an IP address outside the organization's environment. Which of the following should the analyst do to block this activity?
Correct Answer:
B
- (Exam Topic 3)
A consultant evaluating multiple threat intelligence leads to assess potential risks for a client. Which of the following is the BEST approach for the consultant to consider when modeling the client's attack surface?
Correct Answer:
C
- (Exam Topic 3)
Which of the following BEST identifies the appropriate use of threat intelligence as a function of detection and response?
Correct Answer:
B
- (Exam Topic 3)
An analyst is reviewing the following output as part of an incident:
Which of the Wowing is MOST likely happening?
Correct Answer:
C
- (Exam Topic 2)
A forensic analyst took an image of a workstation that was involved in an incident To BEST ensure the image is not tampered with me analyst should use:
Correct Answer:
A