Refer to the exhibit. An engineer is performing static analysis of a file received and reported by a user. Which risk is
indicated in this STIX?
A SOC analyst detected a ransomware outbreak in the organization coming from a malicious email attachment. Affected
parties are notified, and the incident response team is assigned to the case.
According to the NIST incident response handbook, what is the next step in handling the incident?
Which action should be taken when the HTTP response code 301 is received from a web application?
Refer to the exhibit. Where is the MIME type that should be followed indicated?
A security engineer discovers that a spreadsheet containing confidential information for nine of their employees was
fraudulently posted on a competitors website. The spreadsheet contains names, salaries, and social security numbers. What
is the next step the engineer should take in this investigation?
The network operations center has identified malware, created a ticket within their ticketing system, and assigned the case to
the SOC with high-level information. A SOC analyst was able to stop the malware from spreading and identified the attacking
host. What is the next step in the incident response workflow?
How is a SIEM tool used?
Drag and drop the components from the left onto the phases of the CI/CD pipeline on the right.
Select and Place:
Refer to the exhibit. A threat actor behind a single computer exploited a cloud-based application by sending multiple
concurrent API requests. These requests made the application unresponsive. Which solution protects the application from
being overloaded and ensures more equitable application access across the end-user community?
What do 2xx HTTP response codes indicate for REST APIs?