200-201 Exam Question 96

Refer to the exhibit.

What is the potential threat identified in this Stealthwatch dashboard?
  • 200-201 Exam Question 97

    A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?
  • 200-201 Exam Question 98

    Which two elements are used for profiling a network? (Choose two.)
  • 200-201 Exam Question 99

    Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)
  • 200-201 Exam Question 100

    Drag and drop the elements from the left into the correct order for incident handling on the right.