Question 31
What are two denial of service attacks? (Choose two.)
Question 32
Which type of evidence supports a theory or an assumption that results from initial evidence?
Question 33
Refer to the exhibit.
Which type of log is displayed?
Question 34
A security engineer notices confidential data being exfiltrated to a domain "Ranso4134-mware31-895" address that is attributed to a known advanced persistent threat group The engineer discovers that the activity is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Cyber Kill Chain?
Question 35
Which NIST IR category stakeholder is responsible for coordinating incident response among various business units, minimizing damage, and reporting to regulatory agencies?
