Which of the following attack inundates DHCP servers with fake DHCP requests to exhaust all available IP addresses?
Correct Answer:
A
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
Correct Answer:
A
Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers.
What is Ray and his team doing?
Correct Answer:
D
Which of the following attack can be eradicated by disabling of "allow_url_fopen and allow_url_include" in the php.ini file?
Correct Answer:
B
John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(.|(%|%)2E)(.|(%|%)2E)(/|(%|%)2F|\|(%|%)5C)/i.
What does this event log indicate?
Correct Answer:
A