Refer to the exhibit. What can be determined from this ping result?
A. The public IP address of cisco.com is 2001:420:1101:1::a.
B. The Cisco.com website is down.
C. The Cisco.com website is responding with an internal IP.
D. The public IP address of cisco.com is an IPv4 address.
Which element is included in an incident response plan?
A. organization mission
B. junior analyst approval
C. day-to-day firefighting
D. siloed approach to communications
Which of the following is an example of a managed security offering where incident response experts monitor and respond to security alerts in a security operations center (SOC)?
A. Cisco CloudLock
B. Cisco's Active Threat Analytics (ATA)
C. Cisco Managed Firepower Service
D. Cisco Jasper
Which of the following is the team that handles the investigation, resolution, and disclosure of security vulnerabilities in vendor products and services?
A. CSIRT
B. ICASI
C. USIRP
D. PSIRT
Which of the following are examples of Linux boot loaders?
A. GRUB
B. ILOS
C. LILO
D. Ubuntu BootPro
According to NIST SP800-86, which action describes volatile data collection?
A. collection of data before a system reboot
B. collection of data that contains malware
C. collection of data during a system reboot
D. collection of data after a system reboot
Which IETF standard technology is useful to detect and analyze a potential security incident by recording session flows that occurs between hosts?
A. SFlow
B. NetFlow
C. NFlow
D. IPFIX
What can be addressed when using retrospective security techniques?
A. why the malware is still in our network
B. if the affected host needs a software update
C. origin of the malware
D. if the affected system needs replacement
Which component of the Linux ext4 file system records the intentions of changes made to the main part of the file system?
A. MBR
B. swap
C. journal
D. checksum
Why do SOC analysts use 5-tuple?
A. to identify the requirements for creating a functional network connection between two laptops
B. to identify the requirements for creating a wireless network connection between an access point and a host
C. to identify the requirements for creating a data center using best practices
D. to identify the requirements for creating a secure network connection between two or more remote and local machines