Looking for SEC504: Hacker Tools, Techniques, and Incident Handling test answers and solutions? Browse our comprehensive collection of verified answers for SEC504: Hacker Tools, Techniques, and Incident Handling at moodle.excomunicado.fun.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
What components of Infrastructure as a Service (IaaS) is the cloud customer responsible for the security of?
What command will display ASCII and Unicode strings within a malware sample?
Who should make the decision of when to put a system back into production?
What are the phases of incident handling, in order, in the classic sixstep incident response process?
During an incident response, you notice that the following command was issued. What was being done?
C:\> net localgroup administrators
If you believe your system has been the victim of a rootkit attack, what is the most cost-effective form of eradication?
An investigator identifies the following POST request. Which log recorded the activity?
1583050850.951 185 192.168.40.123 TCP_MISS/200 1856 POST - ORIGINAL_DST/172.219.10.153 text/xml
In the following pstree output, which process spawned cmd.exe, which is not normal behavior?
0x8b1b4680:dllhost.exe 356 520 2020-01-18 04:19:55 UTC+0000
. 0x89a412c0:csrss.exe 368 356 2020-01-18 04:19:48 UTC+0000
.. 0x802f61c0:services.exe 520 448 2020-01-18 04:19:48 UTC+0000
... 0x8ac77040:svchost.exe 628 520 2020-01-18 04:19:49 UTC+0000
.. 0x802fc500:lsass.exe 528 448 2020-01-18 04:19:48 UTC+0000
... 0x89766cc0:cmd.exe 920 528 2020-01-18 04:29:17 UTC+0000
.... 0x896a8600:find.exe 1208 920 2020-01-18 04:31:27 UTC+0000
In what way is logging API access to a cloud environment a major incident response benefit?
Which of the commands below would assist with reviewing logging information from Amazon Web Services?