subject

Athreat intelligence analyst who works for a financial services firm received this report:
"there has been an effective waterhole campaign residing at
this domain is delivering ransomware. this ransomware variant has been called "lockmaster" by
researchers due to its ability to overwrite the mbr, but this term is not a malware signature.
execute a defensive operation regarding this attack vector." the analyst ran a query and has assessed
that this traffic has been seen on the network. which of the following actions should the analyst do
next? (select two).
a. advise the firewall engineer to implement a block on the domain
b. visit the domain and begin a threat assessment
c. produce a threat intelligence message to be disseminated to the company
d. advise the security architects to enable full-disk encryption to protect the mbr
e. advise the security analysts to add an alert in the siem on the string "lockmaster"
f. format the mbr as a precaution

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 13:30
Jane’s team is using the v-shaped model for their project. during the high-level design phase of the project, testers perform integration testing. what is the purpose of an integration test plan in the v-model of development? a. checks if the team has gathered all the requirements b. checks how the product interacts with external systems c. checks the flow of data in internal modules d. checks how the product works from the client side
Answers: 1
question
Computers and Technology, 22.06.2019 13:50
The instruction ishl (shift left integer) exists in jvm but not in ijvm. it uses the top two values on the stack, replacing the two with a single value, the result. the sec- ond-from-top word of the stack is the operand to be shifted. its content is shifted left by a value between 0 and 31, inclusive, depending on the value of the 5 least signifi- cant bits of the top word on the stack (the other 27 bits of the top word are ignored). zeros are shifted in from the right for as many bits as the shift count. the opcode for ishl is 120 (0x78).a. what is the arithmetic operation equivalent to shifting left with a count of 2? b. extend the microcode to include this instruction as a part of ijv.
Answers: 1
question
Computers and Technology, 24.06.2019 08:20
Evaluate the scenario below and indicate how to handle the matter appropriately. situation: michael received an e-mail from what he thought was his doctor’s office, requesting his social security number. since he had just been in to see his doctor last week, he replied to the e-mail with his social security number.
Answers: 2
question
Computers and Technology, 24.06.2019 08:30
Intellectual property rights are exclusive rights that protect both the created and the creation. ipr offers exclusively what benefits to the person or people covered by it
Answers: 3
You know the right answer?
Athreat intelligence analyst who works for a financial services firm received this report:
"t...
Questions
question
Mathematics, 12.10.2019 13:50
question
Social Studies, 12.10.2019 13:50