Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

SANS FOUNDATION SEC275 FINAL PAPER 2026 FULL QUESTIONS AND CORRECT ANSWERS GRADED A+

Beoordeling
-
Verkocht
-
Pagina's
24
Cijfer
A+
Geüpload op
22-02-2026
Geschreven in
2025/2026

SANS FOUNDATION SEC275 FINAL PAPER 2026 FULL QUESTIONS AND CORRECT ANSWERS GRADED A+

Instelling
Sans Forensics
Vak
Sans forensics

Voorbeeld van de inhoud

SANS FOUNDATION SEC275 FINAL PAPER 2026
FULL QUESTIONS AND CORRECT ANSWERS
GRADED A+


◉ netstat. Answer: Command used on Linux and Windows (-a -b -o) for
listening to ports to see if an attacker is attempting to connect. Used to
find IoCs


◉ PID. Answer: Process ID


◉ Runlevels. Answer: In UNIX and Linux systems, runlevels indicate
the type of state the
system is in, from 0 (halted), 1 (single user safe mode), 2-5 (multi-user
normal modes) 6 (rebooting). Lower runlevels indicate
maintenance conditions with fewer services running, higher runlevels
are normal
operating conditions.


◉ systemd. Answer: A relatively new software framework used on
Linux systems that provides a system initialization process and system
management functions.

,◉ Startup Folder. Answer: Contains a list of programs that open
automatically when you boot a computer. Simplest way of getting
malware on a user's Windows computer


◉ Rootkits. Answer: software tools used by an attacker to hide actions
or presence of other types of malicious software. Also designed to allow
the attacker back in the system at a later date


◉ Yara. Answer: signature detection tool - the gold standard for
detecting IoCs. It scans a system and compares results with the rules in a
database. It will flag a match as a possible IOC


◉ ARP cache. Answer: A table used to maintain a correlation
between each MAC address and its
corresponding IP address. Meaning any computers that the compromised
computer communicates with will have ARP cache entries.


◉ Mimikatz. Answer: A penetration testing tool used to access RAM to
extract password hashes or plaintext passwords. Often these are valid for
other systems on the network. Can also use hashcat


◉ Man-in-the-middle (MITM) attack. Answer: An attack that relies on
intercepted transmissions. It can take one of several forms, but in all
cases a person redirects or captures secure data traffic while in transit.

, Goal is to intercept password hashes to be able to log into important
systems and file servers. Crack hashes using hashcat


◉ ARP spoofing. Answer: More commonly known as ARP poisoning,
this involves the MAC (Media Access Control) address of the data being
faked by an attacker via the ARP protocol


◉ PsExec. Answer: Designed for network admins to be able to run
PowerShell commands remotely on multiple systems at once


◉ 3 ways to detect exfiltration over HTTPS. Answer: 1. Consider where
the HTTPS traffic is going
2. Set up a network device to use as a proxy and all clients connect
through the proxy
3. Set up a proxy and enable SSL interception on it (configured to trust a
custom SSL certificate)


◉ SMTP Exfiltration. Answer: sending an email through the SMTP
server that the company runs that is hidden within the regular traffic


◉ IRC (Internet Relay Chat). Answer: older chat protocol (plaintext and
no encryption) used a lot in the tech community. Sees a lot of malware
as a command and control channel. Major weakness is that it's an
unusual vector and not often seen in corporate networks.

Geschreven voor

Instelling
Sans forensics
Vak
Sans forensics

Documentinformatie

Geüpload op
22 februari 2026
Aantal pagina's
24
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
Lectryanmittchelle

Maak kennis met de verkoper

Seller avatar
Lectryanmittchelle Chamberlain College of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
8
Lid sinds
5 maanden
Aantal volgers
0
Documenten
2699
Laatst verkocht
4 weken geleden

Here you’ll find carefully structured, exam-focused study materials designed to help you understand faster, revise smarter, and score higher. Every document is organized, clear, and straight to the point , just what you actually need to pass.

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen