Refer to the exhibit.
Drag and drop the element name from the left onto the correct piece of the PCAP file on the right.
A security specialist notices 100 HTTP GET and POST requests for multiple pages on the web servers. The agent in the requests contains PHP code that, if executed, creates and writes to a new PHP file on the webserver. Which event category is described?
A user received a targeted spear-phishing email and identified it as suspicious before opening the content. To which category of the Cyber Kill Chain model does to this type of event belong?
What is a difference between signature-based and behavior-based detection?
Which metric is used to capture the level of access needed to launch a successful attack?