Pre-Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Refer to the exhibit.

An engineer is analyzing this Vlan0386-int12-117.pcap file in Wireshark after detecting a suspicious network activity. The origin header for the direct IP connections in the packets was initiated by a google chrome extension on a WebSocket protocol. The engineer checked message payloads to determine what information was being sent off-site but the payloads are obfuscated and unreadable. What does this STIX indicate?

A.

The extension is not performing as intended because of restrictions since ports 80 and 443 should be accessible

B.

The traffic is legitimate as the google chrome extension is reaching out to check for updates and fetches this information

C.

There is a possible data leak because payloads should be encoded as UTF-8 text

D.

There is a malware that is communicating via encrypted channels to the command and control server

Full Access
Question # 5

Which command does an engineer use to set read/write/execute access on a folder for everyone who reaches the resource?

A.

chmod 666

B.

chmod 774

C.

chmod 775

D.

chmod 777

Full Access
Question # 6

Refer to the exhibit.

Which asset has the highest risk value?

A.

servers

B.

website

C.

payment process

D.

secretary workstation

Full Access
Question # 7

Refer to the exhibit.

An engineer configured this SOAR solution workflow to identify account theft threats and privilege escalation, evaluate risk, and respond by resolving the threat. This solution is handling more threats than Security analysts have time to analyze. Without this analysis, the team cannot be proactive and anticipate attacks. Which action will accomplish this goal?

A.

Exclude the step “BAN malicious IP” to allow analysts to conduct and track the remediation

B.

Include a step “Take a Snapshot” to capture the endpoint state to contain the threat for analysis

C.

Exclude the step “Check for GeoIP location” to allow analysts to analyze the location and the associated risk based on asset criticality

D.

Include a step “Reporting” to alert the security department of threats identified by the SOAR reporting engine

Full Access
Question # 8

Refer to the exhibit.

An engineer is reverse engineering a suspicious file by examining its resources. What does this file indicate?

A.

a DOS MZ executable format

B.

a MS-DOS executable archive

C.

an archived malware

D.

a Windows executable file

Full Access
Question # 9

Refer to the exhibit.

Where are the browser page rendering permissions displayed?

A.

x-frame-options

B.

x-xss-protection

C.

x-content-type-options

D.

x-test-debug

Full Access