DragDrop
Refer to the exhibit Drag and drop the element names from the left onto the corresponding pieces of the PCAP file on the right.
MultipleChoice
Refer to the exhibit.
A workstation downloads a malicious docx file from the Internet and a copy is sent to FTDv. The FTDv sends the file hash to FMC and the tile event is recorded What would have occurred with stronger data visibility?
OptionsMultipleChoice
Refer to the exhibit.
A malicious file has been identified in a sandbox analysis tool.
Which piece of information is needed to search for additional downloads of this file by other hosts?
OptionsMultipleChoice
Refer to the exhibit.
Refer to the exhibit. Where is the executable file?
OptionsMultipleChoice
Refer to the exhibit.
Refer to the exhibit. An employee received an email from an unknown sender with an attachment and reported it as a phishing attempt. An engineer uploaded the file to Cuckoo for further analysis. What should an engineer interpret from the provided Cuckoo report?
OptionsMultipleChoice
Refer to the exhibit.
Refer to the exhibit. An attacker scanned the server using Nmap. What did the attacker obtain from this scan?
OptionsMultipleChoice
Refer to the exhibit.
An engineer received a ticket about a slowdown of a web application, Drug analysis of traffic, the engineer suspects a possible attack on a web server. How should the engineer interpret the Wiresharat traffic capture?
OptionsMultipleChoice
Refer to the exhibit. Where is the executable file?
OptionsMultipleChoice
Refer to the exhibit. An employee received an email from an unknown sender with an attachment and reported it as a phishing attempt. An engineer uploaded the file to Cuckoo for further analysis. What should an engineer interpret from the provided Cuckoo report?
OptionsMultipleChoice
A malicious file has been identified in a sandbox analysis tool.
Which piece of information is needed to search for additional downloads of this file by other hosts?
Options