A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?
Correct Answer:D
Which type of data collection requires the largest amount of storage space?
Correct Answer:D
Which incidence response step includes identifying all hosts affected by an attack'?
Correct Answer:A
A user received a malicious attachment but did not run it. Which category classifies the intrusion?
Correct Answer:D
Refer to the exhibit.
Which application protocol is in this PCAP file?
Correct Answer:B
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
Correct Answer:D