You have run a suspicious file in a sandbox analysis tool to see what the file does. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed or required to investigate the callouts? (Choose two.)

IT Questions BankCategory: CCNA CyberOpsYou have run a suspicious file in a sandbox analysis tool to see what the file does. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed or required to investigate the callouts? (Choose two.)

You have run a suspicious file in a sandbox analysis tool to see what the file does. The analysis report shows that outbound callouts were made post infection. Which two pieces of information from the analysis report are needed or required to investigate the callouts? (Choose two.)

  • file size
  • domain names
  • dropped files
  • signatures
  • host IP addresses

Exam with this question: CCNA SECOPS 210-255 Dumps – Certification Practice Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments