When attempting to collect data from a suspected system compromise, which of the following should generally be collected first?
Which of the following attacks would use “..†notation as part of a web request to access restricted files and directories, and possibly execute code on the web server?
A compromised router is reconfigured by an attacker to redirect SMTP email traffic to the attacker’s server before sending packets on to their intended destinations. Which IP header value would help expose anomalies in the path outbound SMTP/Port 25 traffic takes compared to outbound packets sent to other ports?
Which of the following is an outcome of the initial triage during incident response?
Which tool keeps a backup of all deleted items, so that they can be restored later if need be?
You have been tasked with searching for Alternate Data Streams on the following collection of Windows partitions; 2GB FAT16, 6GB FAT32, and 4GB NTFS. How many total Gigabytes and partitions will you need to search?
A company estimates a loss of $2,374 per hour in sales if their website goes down. Their webserver hosting site’s documented downtime was 7 hours each quarter over the last two years. Using the information, what can the analyst determine?