Which of the following are the three broad categories of cybersecurity investigations?
Answer : A
You receive an alert for malicious code that exploits Internet Explorer and runs arbitrary code on the site visitor machine. The malicous code is on an external site that is being visited by hosts on your network. Which user agent in the HTTP headers in the requests from your internal hosts warrants further investigation?
Answer : A
How do you verify that one of your hosts is potentially compromised based on their communication
destinations?
Answer : A
Which description of a retrospective malware detection is true?
Answer : B
Which of the following is an example of a coordination center?
Answer : C
A CMS plugin creates two files that are accessible from the Internet myplugin.html and exploitable.php. A newly discovered exploit takes advantage of an injection vulnerability in exploitable.php. To exploit the vulnerability, one must send an HTTP POST with specific variables to exploitable.php. You see traffic to your webserver that consists of only HTTP GET requests to myplugin.html. Which category best describes this activity?
Answer : D
You have a video of a suspect entering a data center that was captured on the same that files in the same data center were transferred to a computer. Which type of is this?
Answer : D