An Incident Responder has reviewed a STIX report and now wants to ensure that their systems have NOT been compromised by any of the reported threats. Which two objects in the STIX report will ATP search against? (Choose two.)
A) SHA-256 hash
B) MD5 hash
C) MAC address
D) SHA-1 hash
E) Registry entry
Correct Answer:
Verified
Q85: Which two steps must an Incident Responder
Q86: Which stage of an Advanced Persistent Threat
Q87: A large company has 150,000 endpoints with
Q88: What is the minimum amount of RAM
Q89: Which stage of an Advanced Persistent Threat
Q91: While filling out the After Actions Report,
Q92: Which National Institute of Standards and Technology
Q93: An Incident Responder launches a search from
Q94: An Incident Responder discovers an incident where
Q95: Which final steps should an Incident Responder
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents