ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 77 - 312-40 discussion

Report
Export

An organization uses AWS for its operations. It is observed that the organization's EC2 instance is communicating with a suspicious port. Forensic investigators need to understand the patterns of the current security breach. Which log source on the AWS platform can provide investigators with data of evidentiary value during their investigation?

A.
Amazon CloudTrail
Answers
A.
Amazon CloudTrail
B.
Amazon CloudWatch
Answers
B.
Amazon CloudWatch
C.
Amazon VPC flow logs
Answers
C.
Amazon VPC flow logs
D.
S3 Server Access Logs
Answers
D.
S3 Server Access Logs
Suggested answer: C

Explanation:

1.Understanding the Incident: When an EC2 instance communicates with a suspicious port, it's crucial to analyze network traffic to understand the patterns of the security breach1.

1.Log Sources for Forensic Investigation: AWS provides several log sources that can be used for forensic investigations, including AWS CloudTrail, AWS Config, VPC Flow Logs, and host-level logs1.

1.Amazon VPC Flow Logs: These logs capture information about the IP traffic going to and from network interfaces in a Virtual Private Cloud (VPC). They are particularly useful for understanding network-level interactions, which is essential in this case1.

1.Evidentiary Value: VPC flow logs can provide data with evidentiary value, showing the source, destination, and protocol used in the network traffic, which can help investigators identify patterns related to the security breach1.

1.Other Log Sources: While Amazon CloudTrail and Amazon CloudWatch provide valuable information on user activities and metrics, respectively, they do not offer the detailed network traffic insights needed for this specific forensic investigation1.

AWS Security Incident Response Guide's section on Forensics on AWS1.

asked 18/09/2024
B Erol
57 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first