Which of the following sources is best suited for monitoring threats and vulnerabilities?
When reviewing log files from a recent incident, the response team discovers that most of the network-based indicators are IP-based. It would be helpful to the response team if they could resolve those IP-based indicators to hostnames. Which of the following is BEST suited for this task?
A security professional discovers a new ransomware strain that disables antivirus on the endpoint during an
infection. Which location would be the BEST place for the security professional to find technical information about this malware?
Which of the following is a method of reconnaissance in which a ping is sent to a target with the expectation of receiving a response?
Which of the following attacks involves sending a large amount of spoofed User Datagram Protocol (UDP) traffic to a router’s broadcast address within a network?
What describes the BEST approach for developing a plan to continuously assess and track vulnerabilities on all organizational assets and infrastructure in order to remediate and minimize the opportunity for attacks?
Which of the following methods are used by attackers to find new ransomware victims? (Choose two.)
After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?