1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
12

An organization’s SOC analyst, through examination of the company’s SIEM, discovers what she believes is Chinese-state sponsored

espionage activity on the company’s network. Management agrees with her initial findings given the forensic artifacts she presents are characteristics of malware, but management is unclear on why the analyst thought it was Chinese-state sponsored. You have been brought in as a consultant to help determine 1) whether the systems have been compromised and 2) whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored. What steps would you take to answer these questions given that you have been provided a MD5 hashes, two call back domains, and an email that is believed to have been used to conduct a spearphishing attack associated with the corresponding MD5 hash. What other threat intelligence can be generated from this information and how would that help shape your assessment?
Computers and Technology
1 answer:
Vinil7 [7]3 years ago
3 0

Answer: Provided in the explanation segment

Explanation:

Below is a detailed explanation to make this problem more clearer to understand.

(1). We are asked to determine whether the systems have been compromised;

Ans: (YES) From the question given, We can see that the System is compromised. This is so because the plan of communication has different details of scenarios where incidents occur. This communication plan has a well read table of contents that lists specific type of incidents, where each incident has a brief description of the event.

(2). Whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored.

Ans: I can say that the analyst uses several different internet protocol address located in so as to conduct its operations, in one instance, a log file recovered  form an open indexed server revealed tham an IP address located is used to administer the command control node that was communicating with the malware.

(3). What other threat intelligence can be generated from this information?

Ans: The threat that can be generated from this include; Custom backdoors, Strategic web compromises, and also Web Server  exploitation.

(4). How would that help shape your assessment?

Ans: This helps in such a way where information is gathered and transferred out of the target network which involve movement of files through multiple systems.

Files also gotten from networks as well as  using tools (archival) to compress and also encrypt data with effectiveness of their data theft.

cheers i hope this helped!!!

You might be interested in
As you are designing a site for a client, you notice that the bulleted lists do not appear when a blog is published. You look in
devlian [24]

Answer:

Could be the second or fourth one, not too good with code

Explanation:

6 0
3 years ago
You are a domain administrator for a large, multi-domain network. There are approximately 2500 computers in your domain. Organiz
Anit [1.1K]

Answer:

move the computer accounts from their current location to the correct Organizational Units (OU's)

Explanation:

Based on the information provided within the question it can be said that in this scenario the best thing to do would be to move the computer accounts from their current location to the correct Organizational Units (OU's). This would keep things organized and have each computer account in the unit that they belong with the correct access and privileges that they need.

5 0
4 years ago
Anna has a physical mobility difference, and she uses virtual reality to complete her exercises. To use virtual reality, Anna ne
Zepler [3.9K]

Answer:

Explanation:

The basic concept of virtual reality is that they are a pair of lenses in a headset that allows you to visualize a virtual 3D world and become immersed within it. To do the exercises correctly Anna would need to follow the following basic steps.

Put the virtual glasses over her eyes, complete the exercises in the virtual world, take the virtual glasses off

The headset/glasses need to fit comfortably on her eyes and around her head so that she can clearly see the image on the lenses and so that the headset/glasses do not fall off while she is completing her exercises. Once she is done with her exercises Anna can simply take off her virtual glasses and put them away.

5 0
3 years ago
Technology
Mashcka [7]

Answer

✔ user interface

✔ rendering engine

✔ browser engine

✔ Networking

✔ Data storage

:)

4 0
2 years ago
It's so eazy
Dmitrij [34]

Answer:

  1. true
  2. true
  3. false
  4. true
  5. true
4 0
3 years ago
Read 2 more answers
Other questions:
  • What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patte
    9·1 answer
  • As Alexa types a message, Outlook autosaves the message at various points. In which folder is the message located if Alexa wants
    15·2 answers
  • The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric devic
    11·1 answer
  • The main memory of a computer is made up of a set of memory chips called ___ and ___.
    10·1 answer
  • Which protocol is used to send web pages from a web server to a web browser?
    13·1 answer
  • Can someone answer this ?
    7·1 answer
  • Does unturned game is good for low end PC that without graphics card?​
    5·1 answer
  • How does an Ac Machine work
    14·1 answer
  • Who like anime becus i dooooo ( wrote this becuse i forgot what i was writing abot)
    13·1 answer
  • I'm doing a VHDL program in Vivado, using a zyboz7 20, which would have 2 teams, each of them with different buttons and led lig
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!