Question 6 of 56Which scripts will search a log file for the IP address of 192.168.100.100 and create an output file named parsed_host.log while printing results to the console? A. B. C. D.
Correct Answer:
Question 7 of 56What is the transmogrify anti-forensics technique?
Correct Answer: D
Question 8 of 56What is the steganography anti-forensics technique?
Correct Answer: A
Question 9 of 56A security team receives reports of multiple files causing suspicious activity on users' workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)
Correct Answer: B, C
Question 10 of 56 Refer to the exhibit. An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?