ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 26 Topic 3 Discussion

ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 26 Topic 3 Discussion

212-82 Exam Topic 3 Question 26 Discussion:
Question #: 26
Topic #: 3

Finley, a security professional at an organization, was tasked with monitoring the organizational network behavior through the SIEM dashboard. While monitoring, Finley noticed suspicious activities in the network; thus, he captured and analyzed a single network packet to determine whether the signature included malicious patterns. Identify the attack signature analysis technique employed by Finley in this scenario.


A.

Context-based signature analysis


B.

Atomic-signature-based analysis


C.

Composite signature-based analysis


D.

Content-based signature analysis


Get Premium 212-82 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.