Bonney's system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
Answer : B
According to the Risk Matrix table, what will be the risk level when the probability of an attack is very low and the impact of that attack is major?
Answer : D
Identify the type of attack, an attacker is attempting on www.example.com website.
Answer : A
Which of the following command is used to enable logging in iptables?
Answer : C
What does Windows event ID 4740 indicate?
Answer : A
Which of the following attack can be eradicated by filtering improper XML syntax?
Answer : B
Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?
Answer : C