Question 1
Which data type is necessary to get information about source/destination ports?
Question 2
Refer to the exhibit.
An analyst received this alert from the Cisco ASA device, and numerous activity logs were produced. How should this type of evidence be categorized?
Question 3
Refer to the exhibit.
What is shown in this PCAP file?
Question 4
An intruder attempted malicious activity and exchanged emails with a user and received corporate information, including email distribution lists. The intruder asked the user to engage with a link in an email. When the fink launched, it infected machines and the intruder was able to access the corporate network.
Which testing method did the intruder use?
Question 5
What is a benefit of using asymmetric cryptography?
