DRAG DROP
Refer to the exhibit. Drag and drop the items from the left onto the correct 5-tuple on the right.
Select and Place:
Which string matches the regular expression r(ege)+x?
A. rx
B. regeegex
C. r(ege)x
D. rege+x
Which description of a retrospective malware detection is true?
A. You use Wireshark to identify the malware source.
B. You use historical information from one or more sources to identify the affected host or file.
C. You use information from a network analyzer to identify the malware source.
D. You use Wireshark to identify the affected host or file.
Which of the following is one of the main goals of the CSIRT?
A. To configure the organization's firewalls
B. To monitor the organization's IPS devices
C. To minimize and control the damage associated with incidents, provide guidance for mitigation, and work to prevent future incidents
D. To hire security professionals who will be part of the InfoSec team of the organization.
In addition to cybercrime and attacks, evidence found on a system or network may be presented in a court of law to support accusations of crime or civil action, including which of the following?
A. Fraud, money laundering, and theft
B. Drug-related crime
C. Murder and acts of violence
D. All of the above
Which of the following is the team that handles the investigation, resolution, and disclosure of security vulnerabilities in vendor products and services?
A. CSIRT
B. ICASI
C. USIRP
D. PSIRT
Which machine risk to be infected or something like that?
A. 10.1.0.1
B. 172.11.5.5
C. Other option
Which file system has 32 bits assigned to the address clusters of the allocation table?
A. FAT32
B. NTFS
C. EXT4
D. FAT16
Which regex matches on all lowercase letters only?
A. [a-z]+
B. a*z+
C. [a-z]+
D. a-z+
Which evidence is considered to be the most volatile?
A. disk
B. registers and cache
C. removable media
D. logging