ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 354 - CS0-003 discussion

Report
Export

A SOC receives several alerts indicating user accounts are connecting to the company's identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?

A.

DNS

Answers
A.

DNS

B.

tcpdump

Answers
B.

tcpdump

C.

Directory

Answers
C.

Directory

D.

IDS

Answers
D.

IDS

Suggested answer: D

Explanation:

Intrusion Detection Systems (IDS) logs provide visibility into network traffic patterns and can help detect insecure or unusual connections. These logs will show if non-secure protocols are used, potentially revealing exposed credentials. According to CompTIA CySA+, IDS logs are essential for identifying malicious activity related to communications and network intrusions. Options like DNS (A) and tcpdump (B) provide network details, but IDS specifically monitors for intrusions and unusual activities relevant to security incidents.


asked 17/10/2024
federico monaco
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first