Question 1
Which two elements are used for profiling a network? (Choose two.)
Question 2
A user received a malicious attachment but did not run it.
Which category classifies the intrusion?
Question 3
Refer to the exhibit.
What is shown in this PCAP file?
Question 4

An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture the analyst cannot determine the technique and payload used for the communication.
Which obfuscation technique is the attacker using?
Question 5
Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?
