ExamGecko
Question list
Search
Search

Related questions











Question 240 - 200-201 discussion

Report
Export

Refer to the exhibit.

A security analyst is investigating unusual activity from an unknown IP address Which type of evidence is this file1?

A.

indirect evidence

Answers
A.

indirect evidence

B.

best evidence

Answers
B.

best evidence

C.

corroborative evidence

Answers
C.

corroborative evidence

D.

direct evidence

Answers
D.

direct evidence

Suggested answer: A

Explanation:

The file in question, which contains logs of unsuccessful login attempts from an unknown IP address, is considered indirect evidence. It suggests that there may have been an attempt to gain unauthorized access, but it does not directly prove who was responsible for the attempts. Indirect evidence can be used to support other evidence that may lead to a direct identification of the threat actor.Reference: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) and other Cisco cybersecurity resources provide information on how to analyze and categorize different types of evidence in the context of security incidents.

asked 07/10/2024
Luis Morales
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first