Exam 37: Implementing Cisco Enterprise Network Core Technologies (ENCOR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An organization had a breach due to a phishing attack. An engineer leads a team through the recovery phase of the incident response process. Which action should be taken during this phase?

Free
(Multiple Choice)
4.8/5
(22)
Correct Answer:
Verified

C

A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled "Invoice RE: 0004489". The hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web. What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

Refer to the exhibit. Which indicator of compromise is represented by this STIX? Refer to the exhibit. Which indicator of compromise is represented by this STIX?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

C

An organization is using a PKI management server and a SOAR platform to manage the certificate lifecycle. The SOAR platform queries a certificate management tool to check all endpoints for SSL certificates that have either expired or are nearing expiration. Engineers are struggling to manage problematic certificates outside of PKI management since deploying certificates and tracking them requires searching server owners manually. Which action will improve workflow automation?

(Multiple Choice)
4.8/5
(35)

An employee who often travels abroad logs in from a first-seen country during non-working hours. The SIEM tool generates an alert that the user is forwarding an increased amount of emails to an external mail domain and then logs out. The investigation concludes that the external domain belongs to a competitor. Which two behaviors triggered UEBA? (Choose two.)

(Multiple Choice)
4.8/5
(39)

Refer to the exhibit. Which command was executed in PowerShell to generate this log? Refer to the exhibit. Which command was executed in PowerShell to generate this log?

(Multiple Choice)
4.8/5
(34)

What is idempotence?

(Multiple Choice)
4.8/5
(32)

An engineer received multiple reports from users trying to access a company website and instead of landing on the website, they are redirected to a malicious website that asks them to fill in sensitive personal data. Which type of attack is occurring?

(Multiple Choice)
4.8/5
(43)

A logistic company must use an outdated application located in a private VLAN during the migration to new technologies. The IPS blocked and reported an unencrypted communication. Which tuning option should be applied to IPS?

(Multiple Choice)
4.9/5
(40)

What is a limitation of cyber security risk insurance?

(Multiple Choice)
4.8/5
(40)

An engineer received an alert of a zero-day vulnerability affecting desktop phones through which an attacker sends a crafted packet to a device, resets the credentials, makes the device unavailable, and allows a default administrator account login. Which step should an engineer take after receiving this alert?

(Multiple Choice)
4.7/5
(29)

  Refer to the exhibit. At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners? Refer to the exhibit. At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?

(Multiple Choice)
4.8/5
(32)

Which bash command will print all lines from the "colors.txt" file containing the non case-sensitive pattern "Yellow"?

(Multiple Choice)
4.9/5
(24)

An analyst is alerted for a malicious file hash. After analysis, the analyst determined that an internal workstation is communicating over port 80 with an external server and that the file hash is associated with Duqu malware. Which tactics, techniques, and procedures align with this analysis?

(Multiple Choice)
4.7/5
(42)

The incident response team receives information about the abnormal behavior of a host. A malicious file is found being executed from an external USB flash drive. The team collects and documents all the necessary evidence from the computing resource. What is the next step?

(Multiple Choice)
4.8/5
(40)

Refer to the exhibit. What is occurring in this packet capture? Refer to the exhibit. What is occurring in this packet capture?

(Multiple Choice)
4.9/5
(34)

A SIEM tool fires an alert about a VPN connection attempt from an unusual location. The incident response team validates that an attacker has installed a remote access tool on a user's laptop while traveling. The attacker has the user's credentials and is attempting to connect to the network. What is the next step in handling the incident?

(Multiple Choice)
4.7/5
(33)

An employee abused PowerShell commands and script interpreters, which lead to an indicator of compromise (IOC) trigger. The IOC event shows that a known malicious file has been executed, and there is an increased likelihood of a breach. Which indicator generated this IOC event?

(Multiple Choice)
4.8/5
(30)

After a recent malware incident, the forensic investigator is gathering details to identify the breach and causes. The investigator has isolated the affected workstation. What is the next step that should be taken in this investigation?

(Multiple Choice)
4.9/5
(31)

An analyst wants to upload an infected file containing sensitive information to a hybrid-analysis sandbox. According to the NIST.SP 800-150 guide to cyber threat information sharing, what is the analyst required to do before uploading the file to safeguard privacy?

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)