Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?
Correct : B
DNS tunneling is an attack technique where data packets are disguised as DNS queries and sent to a remote server. That server, often under the attacker's control, responds with additional data or instructions, effectively creating a covert command-and-control (C2) channel over DNS.
Start a Discussions
Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?
Correct : B
The Privilege Escalation tactic in the MITRE ATT&CK framework involves techniques used by attackers to gain higher-level permissions on a system or network, allowing greater access to internal servers and sensitive data.
Start a Discussions
Which scenario highlights how a malicious Portable Executable (PE) file is leveraged as an attack?
Correct : C
Malicious Portable Executable (PE) files hidden inside PDFs represent a stealthy delivery tactic where attackers embed executable payloads within seemingly benign documents. When a user opens the PDF, the embedded PE executes, potentially installing malware. This approach combines social engineering with file obfuscation to bypass traditional detection methods. Palo Alto Networks' Advanced WildFire sandboxing inspects such files by detonating them in isolated environments to observe behavior and identify hidden threats. This detection technique is critical for uncovering evasive malware concealed within common file types before they reach end-users.
Start a Discussions
Which security tool provides policy enforcement for mobile users and remote networks?
Correct : B
Prisma Access is a cloud-delivered security platform that provides policy enforcement, secure access, and threat prevention for mobile users and remote networks, ensuring consistent security regardless of location.
Start a Discussions
Which feature is part of an intrusion prevention system (IPS)?
Correct : B
An Intrusion Prevention System (IPS) includes automated security actions, such as blocking malicious traffic, resetting connections, or alerting administrators when it detects suspicious activity, helping to stop attacks in real time.
Start a Discussions