Question: Examples of scanning include: Select 4 correct answer ( s ) Question 1 options: SMB Enumeration NMAP and ARP Scanning Use of CLI commands like
Examples of scanning include:
Select correct answers
Question options:
SMB Enumeration
NMAP and ARP Scanning
Use of CLI commands like sSsU and
Searches for open ports
Question
From the following list, select all the places where you might find evidence of scanning attempts.
Question options:
Router Logs
DNS logs
VOIPVTC logs
Firewall logs
Question
This activity in the reconnaissance phase will identify live hosts and IP addresses
Question options:
Vulnerability Scanning
Port Scanning
Ping Sweep
None of the above
Question
You are the network administrator at American Express. Your best attitude to cyber defense is to assume that adversaries are already resident on your network.
Question options:
TrueFalse
Question
As a threat hunter you discovered an IP address inside the perimeter with the highest number of external connections; that also has extremely long connection times; and transfers significant numbers of large TCP packets out of the network. You determine this is perfectly normal.
Question options:
True
False
Question
Network Security Monitoring NSM can be used for which of the following purposes?
Question options:
Connecting the dots between seemingly disparate information.
Detecting indications of abnormal network activity.
Monitoring traffic into and out of networkbased assets containing sensitive information.
All of the above
Question
The TCP threeway handshake refers to the TCP header with certain flags set and exchanged in a particular order. Place the flags in their proper order.
Question options:
SYN ACK
SYN
ACK
Question
Snort is used to detect anomalous network activity based on which of the following?
Question options:
Signatures
Behaviors
Alerts
None of the above
Question
One limitation of Snort is that it cannot be used to alert on blacklisted IP addresses.
Question options:
True
False
Question
Signs of excessive failed logon attempts from external IP addresses fits into which stage of the cyber kill chain?
Question options:
Reconnaissance
Weaponization
Actions on Objectives
Command and Control
Question
Review the Security Onion Dashboards for the range of June to August Select the "Security Onion Alerts Suricata" Dashboard. In the "Security Onion Rule Name" tile find the ET MALWARE Possible Metasploit Payload Common Construct BindAPI from server link. Hover over it to get the plus sign. Click the plus sign.
From the options below, select the three Destination IP addresses which received the payload.
Question options:
Question
While reviewing the Kibana web interface you notice SIP traffic on port Select the correct answer from the list below.
Question options:
This is evidence of port scanning
None of the selections are correct
This is anomalous behavior and warrants investigation.
This is normal VoIP traffic.
Question
Review the Security Onion Dashboards for the range of June to August Select the "Security Onion Alerts" Dashboard. In the "Security Onion Rule Category" find the "Potential Corporate Privacy Violation" link. Hover over it to get the plus sign. Click the plus sign.
From the options below, select the two rules that generated the alert.
Question options:
ET POLICY PE EXE or DLL Windows file download HTTP
ET POLICY DNS Update From External net
ET SCAN Suspicious inbound to Oracle SQL port
Generic Protocol Command Decode
Question
Your firewall does not allow ICMP requests. What else should you look for that might indicate enumeration is ongoing?
Question options:
ARP
SMTP
HTTPS on port
None of the above
Question
Review the Security Onion Dashboards for the range of June to August Select the "Security Onion RDP Dashboard. From the options below, select the source IP addresses from the Deepship network initiating Remote Desktop connections.
Question options:
Question
If we cannot prevent a breach of the time, we must decrease the dwell time of the adversary.
Question options:
True
False
Question
From the list below select all that apply to the Applied Collection Framework ACF
Question options:
Define Threats
Quantify Risks
Identify Data Feeds
Narrow the Focus
Question
An attacker already on the network can completely hide data exfiltration by encrypting the data stream. Encryption will make the data exfiltration impossible to find.
Question options:
True
False
Question
You are reviewing network activity through the Kibana web interface. You see that a server in the DMZ is sending TCP SYN packets to an internal IP address. Select the correct answer from the list below.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
