Exam 9: Reacting to a Cyber Incident: Analyzing Common Symptoms

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following is not a network symptom of an attack?

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

B

Name a tool that can be used to determine if a cyber incident is taxing a processor's resources.

Free
(Essay)
4.8/5
(43)
Correct Answer:
Verified

A resource monitor, Microsoft Windows Resource Monitor, or the Sysinternals Process Explorer

What is the term for thousands of bot computers that are gathered into a logical computer network?

Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
Verified

D

What is a sudden, unusual surge in network bandwidth use called?

(Multiple Choice)
4.9/5
(39)

What is the act of changing operating system settings or exploiting a software vulnerability to access resources that users normally would be restricted from accessing?

(Short Answer)
4.8/5
(30)

_______________ occurs when infected devices attempt to contact a threat actor's external command and control (C&C) server.

(Short Answer)
4.8/5
(40)

Attackers have no reliable way to take advantage of a processor with multiple cores.

(True/False)
4.7/5
(37)

What is a named pipe?

(Short Answer)
4.8/5
(38)

What kind of attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer?

(Multiple Choice)
4.8/5
(41)

In the context of cybersecurity, DLP is an abbreviation for which of the following?

(Multiple Choice)
4.9/5
(42)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)