ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 82 - 212-82 discussion

Report
Export

Finley, a security professional at an organization, was tasked with monitoring the organizational network behavior through the SIEM dashboard. While monitoring, Finley noticed suspicious activities in the network; thus, he captured and analyzed a single network packet to determine whether the signature included malicious patterns. Identify the attack signature analysis technique employed by Finley in this scenario.

A.
Context-based signature analysis
Answers
A.
Context-based signature analysis
B.
Atomic-signature-based analysis
Answers
B.
Atomic-signature-based analysis
C.
Composite signature-based analysis
Answers
C.
Composite signature-based analysis
D.
Content-based signature analysis
Answers
D.
Content-based signature analysis
Suggested answer: D

Explanation:

Content-based signature analysis is the attack signature analysis technique employed by Finley in this scenario. Content-based signature analysis is a technique that captures and analyzes a single network packet to determine whether the signature included malicious patterns. Content-based signature analysis can be used to detect known attacks, such as buffer overflows, SQL injections, or cross-site scripting2.

Reference: Content-Based Signature Analysis

asked 18/09/2024
Abigail Dodson
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first