An alert was generated that an anomalous logon occurred to one of our servers. What are the questions that should be asked?
What are some of the common cybersecurity incidents that incident response teams need to react to? (7)
What are the different kinds of data breaches?
You receive an alert that claims that a user station is uploading a lot of data to an unknown IP address. How do you approach this?
You are investigating a potential memory-based malware on a Windows system. This type of malware resides in memory and typically leaves no traces on the hard drive. What specific tools and commands would you use to analyze and identify this kind of malware? Describe your approach in detail.”
What tools can you use to dump the content of the memory in Windows?
How would you use livekd command to create a memory dump file?
livekd -m c:\memory.dmp