List of questions
Related questions
Question 163 - 200-201 discussion
A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?
A.
event name, log source, time, source IP, and host name
B.
protocol, source IP, source port, destination IP, and destination port
C.
event name, log source, time, source IP, and username
D.
protocol, log source, source IP, destination IP, and host name
Your answer:
0 comments
Sorted by
Leave a comment first