312-39 Exam Question 1

Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?
  • 312-39 Exam Question 2

    Jane, a security analyst, while analyzing IDS logs, detected an event matching Regex /((\%3C)|<)((\%69)|i|(\%
    49))((\%6D)|m|(\%4D))((\%67)|g|(\%47))[^\n]+((\%3E)|>)/|.
    What does this event log indicate?
  • 312-39 Exam Question 3

    Which of the following technique involves scanning the headers of IP packets leaving a network to make sure that the unauthorized or malicious traffic never leaves the internal network?
  • 312-39 Exam Question 4

    Which of the following is a report writing tool that will help incident handlers to generate efficient reports on detected incidents during incident response process?
  • 312-39 Exam Question 5

    Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating files at /var/log/ wtmp.
    What Chloe is looking at?