An incident responder notices many entries in an apache access log file that contain semicolons. Which of the following attacks is MOST likely being attempted?
Answer : A
As part of an incident response effort, data has been collected and analyzed, and a malware infection has been contained. Which of the following is the NEXT step the incident response team should take within the incident response process?
Answer : B
Which of the following enables security personnel to have the BEST security incident recovery practices?
Answer : D
Which of the following mitigations will remain intact, regardless of the underlying network protocol?
Answer : A
A network administrator has been asked to configure a new network. It is the company's policy to segregate network functions using different Virtual LANs (VLANs). On which of the following is this configuration MOST likely to occur?
Answer : A
Which of the following are legally compliant forensics applications that will detect ADS or a file with an incorrect file extension? (Choose two.)
Answer : A, C
An administrator wants to block Java exploits that were not detected by the organization's antivirus product. Which of the following mitigation methods should an incident responder perform? (Choose two.)
Answer : C, E