An engineer received an alert affecting the degraded performance of a critical server Analysis showed a heavy CPU and memory load What is the next step the engineer should take to investigate this resource usage7
A security consultant must change the identity access management model fof their organization The new approach will put responsibility on the owner, who will decide whichusers will have access to which resources Which low-cost model must be used for this purpose?
What is a difference between SIEM and SOAR?
Which technique obtains information about how the system works without knowing it's design details?
Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS servers via DHCP Which type of attack is occurring?
Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?
What is the function of a command and control server?
A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?
Which two elements are assets in the role of attribution in an investigation? (Choose two.)
What is a difference between inline traffic interrogation and traffic mirroring?