ExamGecko
Question list
Search
Search

Related questions











Question 167 - 200-201 discussion

Report
Export

An organization's security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning How should the analyst collect the traffic to isolate the suspicious host?

A.

by most active source IP

Answers
A.

by most active source IP

B.

by most used ports

Answers
B.

by most used ports

C.

based on the protocols used

Answers
C.

based on the protocols used

D.

based on the most used applications

Answers
D.

based on the most used applications

Suggested answer: A

Explanation:

To isolate the suspicious host that is performing intensive network scanning, the analyst should collect the traffic by most active source IP. This will help to identify the IP address of the host that is generating the most traffic and sending the most packets or bytes. The analyst can then apply filters or queries to analyze the traffic from that source IP and determine the nature and scope of the scanning activity.Reference:=Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Cisco, page 72; [Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide], page 468

asked 07/10/2024
nir avron
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first