During which of the following attack phases might a request sent to port 1433 over a whole company network be seen within a log?
Which three tools are used for integrity verification of files? (Choose three.)
sha256sum: This tool calculates the SHA-256 hash of a file, which can be used for integrity verification by comparing the hash value with a known, trusted value.
md5sum: This tool calculates the MD5 hash of a file, which can also be used to verify its integrity by checking against a known hash value.
md5deep: This is a tool that provides recursive MD5 hash calculation, which can be useful for verifying the integrity of multiple files at once.
During an incident, the following actions have been taken:
- Executing the malware in a sandbox environment
- Reverse engineering the malware
- Conducting a behavior analysis
Based on the steps presented, which of the following incident handling processes has been taken?
The ''Containment, eradication and recovery'' phase is the period in which incident response team tries to contain the incident and, if necessary, recover from it (restore any affected resources, data and/or processes).
Which of the following data sources could provide indication of a system compromise involving the exfiltration of data to an unauthorized destination?
Which encryption technology was built into Mac OS X?
FileVault is the encryption technology built into Mac OS X (and later macOS). It provides full disk encryption to protect data by encrypting the entire disk using XTS-AES-128 encryption with a 256-bit key.
Shantell
18 days agoVallie
2 months agoVanna
4 months agoTalia
5 months agoKattie
6 months agoLawrence
6 months agoColette
7 months agoDewitt
7 months agoElise
8 months agoRex
8 months agoKimbery
8 months agoPenney
9 months agoLoise
9 months agoNatalie
9 months agoMatthew
10 months agoAndra
10 months agoElfriede
10 months agoCecilia
11 months agoGearldine
11 months agoKallie
11 months agoJerry
11 months agoDenise
1 years agoGail
1 years agoJosefa
1 years agoPaz
1 years agoMaurine
1 years agoCherelle
1 years agoEdelmira
1 years ago