List of questions
Related questions
Question 82 - 212-82 discussion
Finley, a security professional at an organization, was tasked with monitoring the organizational network behavior through the SIEM dashboard. While monitoring, Finley noticed suspicious activities in the network; thus, he captured and analyzed a single network packet to determine whether the signature included malicious patterns. Identify the attack signature analysis technique employed by Finley in this scenario.
A.
Context-based signature analysis
B.
Atomic-signature-based analysis
C.
Composite signature-based analysis
D.
Content-based signature analysis
Your answer:
0 comments
Sorted by
Leave a comment first