List of questions
Related questions
Question 354 - CS0-003 discussion
A SOC receives several alerts indicating user accounts are connecting to the company's identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?
A.
DNS
B.
tcpdump
C.
Directory
D.
IDS
Your answer:
0 comments
Sorted by
Leave a comment first