Refer to the exhibit. Which element in this email is an indicator of attack?
C
A security team receives reports of multiple files causing suspicious activity on users workstations. The file attempted to
access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to
evaluate the file in a sandbox? (Choose two.)
B C
Explanation:
Reference: https://medium.com/@Flying_glasses/top-5-ways-to-detect-malicious-file-manually-d02744f7c43a
An engineer received a call to assist with an ongoing DDoS attack. The Apache server is being targeted, and availability is
compromised. Which step should be taken to identify the origin of the threat?
D
Refer to the exhibit. What should be determined from this Apache log?
D
Which information is provided bout the object file by the “-h” option in the objdump line command objdump –b oasys –m vax
–h fu.o?
D
Explanation:
Reference: https://sourceware.org/binutils/docs/binutils/objdump.html
An employee receives an email from a trusted person containing a hyperlink that is malvertising. The employee clicks the
link and the malware downloads. An information analyst observes an alert at the SIEM and engages the cybersecurity team
to conduct an analysis of this incident in accordance with the incident response plan. Which event detail should be included
in this root cause analysis?
B
What is a concern for gathering forensics evidence in public cloud environments?
D
Explanation:
Reference: https://www.researchgate.net/publication/307871954_About_Cloud_Forensics_Challenges_and_Solutions
Which technique is used to evade detection from security products by executing arbitrary code in the address space of a
separate live operation?
A
Explanation:
Reference: https://attack.mitre.org/techniques/T1055/
Refer to the exhibit. Which encoding technique is represented by this HEX string?
B
Explanation:
Reference: https://www.suse.com/c/making-sense-hexdump/
What is the steganography anti-forensics technique?
A
Explanation:
https://blog.eccouncil.org/6-anti-forensic-techniques-that-every-cyber-investigator-dreads/