Question 25

Jason, a SOC Analyst with Maximus Tech, was investigating Cisco ASA Firewall logs and came across the following log entry:
May 06 2018 21:27:27 asa 1: %ASA -5 – 11008: User 'enable_15' executed the 'configure term' command What does the security level in the above log indicates?

Correct Answer:A

Question 26

What does the HTTP status codes 1XX represents?

Correct Answer:A

Question 27

Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating files at /var/log/ wtmp.
What Chloe is looking at?

Correct Answer:D

Question 28

In which of the following incident handling and response stages, the root cause of the incident must be found from the forensic results?

Correct Answer:A

Question 29

In which log collection mechanism, the system or application sends log records either on the local disk or over the network.

Correct Answer:A

Question 30

The threat intelligence, which will help you, understand adversary intent and make informed decision to ensure appropriate security in alignment with risk.
What kind of threat intelligence described above?

Correct Answer:B

START 312-39 EXAM