ExamGecko
Question list
Search
Search

Related questions











Question 163 - 200-201 discussion

Report
Export

A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?

A.

event name, log source, time, source IP, and host name

Answers
A.

event name, log source, time, source IP, and host name

B.

protocol, source IP, source port, destination IP, and destination port

Answers
B.

protocol, source IP, source port, destination IP, and destination port

C.

event name, log source, time, source IP, and username

Answers
C.

event name, log source, time, source IP, and username

D.

protocol, log source, source IP, destination IP, and host name

Answers
D.

protocol, log source, source IP, destination IP, and host name

Suggested answer: B

Explanation:

The 5-tuple approach consists of protocol, source IP address, source port number, destination IP address, and destination port number to uniquely identify sessions between endpoints on a network.Reference:=Cisco Cybersecurity Source Documents

asked 07/10/2024
CATALIN FLORESCU
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first