How does an attack surface differ from an attack vector?
When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?
Which regular expression matches loopback IP address (127.0.0.1)?
What describes the defense-m-depth principle?
An engineer must investigate suspicious connections. Data has been gathered using a tcpdump command on a Linux device and saved as sandboxmatware2022-12-22.pcaps file.The engineer is trying to open the tcpdump in the Wireshark tool. What is the expected result?
Refer to the exhibit A penetration tester runs the Nmap scan against the company server to uncover possible vulnerabilities and exploit them Which two elements can the penetration tester identity from the scan results? (Choose two.)
A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?
How does certificate authority impact a security system?
What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)
A malicious file has been identified in a sandbox analysis tool.
Which piece of information is needed to search for additional downloads of this file by other hosts?