
How to mitigate risk from nation-state attacks
Interactive Video
•
Architecture, Information Technology (IT)
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended tool for creating forensic images of systems?
Azure Sentinel
Splunk
Access Data FTK Imager
Wireshark
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a long-term solution for storing log files?
Splunk
Access Data FTK Imager
Windbg
Wireshark
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Kerber roasting, and why is it important to log it?
A type of cyber attack targeting service account credentials
A technique to improve network speed
A method to roast Kerberos tickets for better security
A process to enhance firewall security
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What did attackers verify before installing themselves in the SolarWinds attack?
Presence of sysinternals tools
Presence of Access Data FTK Imager
Availability of Splunk
Existence of Azure Sentinel
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is recommended for monitoring systems to detect backdoor activities?
sysmon
Wireshark
Access Data FTK Imager
Windbg
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?