Where will you find the reputation IP database, if you want to monitor traffic from known bad IP
reputation using OSSIM SIEM?
D
Explanation:
According to the Risk Matrix table, what will be the risk level when the probability of an attack is very
low and the impact of that attack is major?
D
Explanation:
Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?
B
Explanation:
Reference:
https://tecadmin.net/enable-logging-in-iptables-on-linux/
Which of the following technique involves scanning the headers of IP packets leaving a network to
make sure
that the unauthorized or malicious traffic never leaves the internal network?
A
Explanation:
Reference:
https://grokdesigns.com/wp-content/uploads/2018/04/CEH-v9-Notes.pdf
(99)
Which of the following formula is used to calculate the EPS of the organization?
C
Explanation:
Juliea a SOC analyst, while monitoring logs, noticed large TXT, NULL payloads.
What does this indicate?
B
Explanation:
Reference:
https://www.google.com/url
?
sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwj8gZaKq_PuAhWGi1wKHfQTC0oQFjAAegQI
ARAD
&url=https%3A%2F%2Fconf.splunk.com%2Fsession%2F2014%
2Fconf2014_FredWilmotSanfordOwings_Splunk_Security.pdf&usg=AOvVaw3ZLfzGqM-
VUG7xKtze67ac
An organization is implementing and deploying the SIEM with following capabilities.
What kind of SIEM deployment architecture the organization is planning to implement?
C
Explanation:
What is the process of monitoring and capturing all data packets passing through a given network
using different tools?
C
Explanation:
Reference:
https://www.greycampus.com/opencampus/ethical-hacking/sniffing-and-its-types
Which of the following is a report writing tool that will help incident handlers to generate efficient
reports on detected incidents during incident response process?
C
Which of the following Windows features is used to enable Security Auditing in Windows?
C
Explanation:
Reference:
https://resources.infosecinstitute.com/topic/how-to-audit-windows-10-application-logs/