ExamGecko
Question list
Search
Search

Related questions











Question 158 - 300-710 discussion

Report
Export

An analyst is investigating a potentially compromised endpoint within the network and pulls a host report for the endpoint in question to collect metrics and documentation. What information should be taken from this report for the investigation?

A.

client applications by user, web applications, and user connections

Answers
A.

client applications by user, web applications, and user connections

B.

number of attacked machines, sources of the attack, and traffic patterns

Answers
B.

number of attacked machines, sources of the attack, and traffic patterns

C.

intrusion events, host connections, and user sessions

Answers
C.

intrusion events, host connections, and user sessions

D.

threat detections over time and application protocols transferring malware

Answers
D.

threat detections over time and application protocols transferring malware

Suggested answer: C
asked 07/10/2024
Igor An
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first