An analyst receives artifacts from a recent intrusion and is able to pull domain, IP address, email,
Question:
An analyst receives artifacts from a recent intrusion and is able to pull domain, IP address, email, and software version. Which of the following points of the Diamond model of intrusion Analysis does this intelligence represent?
A. Adversary
B. Capabilities
C Victims
D. infrastructure
During an incident investigation, some users discover that all downloaded files from the Internet through the company's network have the same executable file and hash signature, independent of the download's source or file's extension. Which of the following techniques were MOST likely used to perform this attack? (Select TWo)
A. Man in the middle
B. Remote code execution
C. ARP spooling
D. Stored cross-site scripting
E. Email phishing
F. Log poisoning
Which of the following is a potential vulnerability associated using embedded operating systems?
A. An embedded operating system may require several FPGAS during normal operation.
B. An embedded operating system cannot be patched as easily as a traditional operating system.
C. An embedded operating system is typically written in non-standard programming languagen
D. An embedded operating system requires additional ports and protocols.
Systems analysis and design
ISBN: 978-0136089162
8th Edition
Authors: kenneth e. kendall, julie e. kendall