uC 003 Malicious Activity

uC 003 Malicious Activity

University

48 Qs

quiz-placeholder

Similar activities

Chapter 5.4

Chapter 5.4

University

53 Qs

Network Plus Certification

Network Plus Certification

11th Grade - University

45 Qs

Networking Certification

Networking Certification

11th Grade - University

45 Qs

IOT test

IOT test

University

50 Qs

Data Communications Reviewer for UT1

Data Communications Reviewer for UT1

University

45 Qs

Quiz Latihan Soal-Soal UTS Keamanan Jaringan

Quiz Latihan Soal-Soal UTS Keamanan Jaringan

KG - University

50 Qs

98-366 Lesson 3 Wired and Wireless Networks

98-366 Lesson 3 Wired and Wireless Networks

10th Grade - University

46 Qs

Computer Networking 1 Prelim Exam

Computer Networking 1 Prelim Exam

University

50 Qs

uC 003 Malicious Activity

uC 003 Malicious Activity

Assessment

Quiz

Computers

University

Hard

Created by

Jose Manuel Rios

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Nick wants to analyze a potentially malicious software package using an open-source, locally hosted tool. Which of the following tools is best suited to his need if he wants to run the tool as part of the process?

Cuckoo Sandbox

SIEM 

EDR

VirusTotal

Answer explanation

Automated malware analysis with Cuckoo Sandbox

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cynthia wants to build scripts to detect malware beaconing behavior. Which of the following is not a means of identifying malware beaconing behavior for building scripts on a network?

Beaconing interval

Removal of known traffic

Beacon protocol

Persistence of the beaconing

Answer explanation

A beacon protocol is not a means of identifying malware beaconing behavior for building scripts on a network. Unless Cynthia already knows the protocol that a particular beacon uses, filtering out beacons by protocol may cause her to miss beaconing behavior. Attackers want to dodge common analytical tools and will use protocols that are less likely to attract attention.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Henry wants to identify potentially unauthorized scheduled tasks on a Linux system. What Linux command is most useful to identify scheduled tasks?

cron

chmod

ps

ls

Answer explanation

The cron command is used to set, view, and maintain scheduled tasks in Linux. Scheduled tasks, or cron jobs in Linux, are also a popular method for attackers to maintain persistent access to systems. Checking for unexpected scheduled tasks (or cron jobs) is a common part of incident response processes.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


Angela wants to search for rogue devices on her network. Which of the following techniques will best help her identify systems if she has a complete hardware and systems inventory?

Traffic analysis for unexpected behavior

MAC address verification

MAC address vendor checking

Site surveys

Answer explanation

Since Angela already knows the media access control (MAC) addresses of all the devices due to her systems inventory, she can simply search for associated MAC addresses that do not match the list.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ian wants to provide additional email security for his organization. Which of the following is not used to enhance email security?

DKIM

DMARC

S/PDIF

SPF

Answer explanation

Automated malware analysis with Cuckoo Sandbox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a common network issue?

Beaconing

Bandwidth consumption

Unexpected traffic

Link aggregation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Brian works in an XYZ organization. His network suddenly stops working at 8:40 AM, interrupting video conferences, streaming, and other services throughout his organization, and then resumes functioning. When Brian logs into his Paessler Router Traffic Grapher (PRTG) console and checks his router's traffic via the primary connection's redundant network link, he sees the following graph. What should Brian presume occurred based on the given information shown in Figure A?

The network has failed and is running in cached mode.

PRTG stopped receiving flow information and needs to be restarted.


The primary link had gone down and he should check the secondary link for traffic.

There was a link card failure and the card has recovered.

Answer explanation

PRTG

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?