1.
A security analyst discovers a zero-day vulnerability affecting Windows, which has not been publicly identified. The security analyst assumes this vulnerability is present on millions of computer system and feels an obligation to share this information with other security professionals. Which of the following would be the MOST adverse consequences of the analyst sharing this information?
2.
As part of an incident response effort, data has been collected and analyzed, and a malware infection has been contained. Which of the following is the NEXT step the incident response team should take within the incident response process?
3.
A security analyst would like to parse through several SQL logs for indicators of compromise. The analyst is aware that none of the fields should contain a string of text longer than 30 characters; however, the analyst is unaware if there are any implemented controls to prevent such an overflow. Which of the following BEST describes the regular expression the analyst should use to find any alphanumeric character string?
4.
An incident responder needs to quickly locate specific data in a large data repository. Which of the following Linux tool should be used?
5.
An attacker has sent malicious macro-enabled Office files. Which of the following regular expressions will return a list of macro-enabled files?
6.
A SOC analyst has been tasked with checking all files in every employee home directory for any mention of a new product code named PitViper. Which of th following commands will return all requested data?
7.
Which of the following is the BEST way to capture all network traffic between hosts on a segmented network?
8.
Customers are reporting issues connecting to a company's Internet server. Which of the following device logs should a technician review in order to help identify the issue?
9.
An unauthorized network scan may be detected by parsing network sniffer data for:
10.
During an investigation on Windows 10 system, a system administrator needs to analyze Windows event logs related to CD/DVD-burning activities. In which of the following paths will the system administrator find these logs?