Question 6 of 84

Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers.

What is Ray and his team doing?

    Correct Answer: D

    Ray and his team are increasing the network devices' bandwidth and the servers' capacity to handle the increased traffic caused by the DoS/DDoS attack. This method helps to minimize the impact and maintain service availability by absorbing the attack rather than blocking it or diverting it elsewhere. By enhancing the system's capacity to manage the increased load, they ensure that the services remain largely unaffected, thus absorbing the attack.

Question 7 of 84

Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown: http://www.terabytes.com/process.php./../../../../etc/passwd

    Correct Answer: A

    The correct answer is Directory Traversal Attack. This type of attack occurs when an attacker manipulates the URL path to access files and directories that are outside the web application's root directory. In this case, the use of '../' sequences in the URL is an attempt to traverse the directory structure to access the '/etc/passwd' file, which contains sensitive information such as user passwords.

Question 8 of 84

Which encoding replaces unusual ASCII characters with "%" followed by the character’s two-digit ASCII code expressed in hexadecimal?

    Correct Answer: D

    URL Encoding replaces unusual ASCII characters with '%' followed by the character’s two-digit ASCII code expressed in hexadecimal. This method is commonly used to represent special characters and non-alphanumeric characters in URLs, ensuring they are transmitted and processed correctly by web applications.

Question 9 of 84

Which of the following formula represents the risk?

    Correct Answer: D

    Risk is typically calculated using the formula Risk = Likelihood × Impact × Asset Value. This formula reflects how risk is assessed in terms of the probability of an event occurring, the potential effect of the event, and the value of the asset involved. This helps quantify risk in a way that can be managed and mitigated effectively.

Question 10 of 84

The Syslog message severity levels are labelled from level 0 to level 7.

What does level 0 indicate?

    Correct Answer: C

    The Syslog message severity levels are indeed labelled from level 0 to level 7, where each level indicates the severity of the message. According to standard Syslog definitions, level 0 indicates 'Emergency,' meaning that the system is unusable. This is the highest severity level and signifies a critical condition that needs immediate attention.