ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 527 - 220-1102 discussion

Report
Export

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

A.
Investigate the firewall logs.
Answers
A.
Investigate the firewall logs.
B.
Isolate the machine from the network.
Answers
B.
Isolate the machine from the network.
C.
Inspect the Windows Event Viewer.
Answers
C.
Inspect the Windows Event Viewer.
D.
Take a physical inventory of the device.
Answers
D.
Take a physical inventory of the device.
Suggested answer: B

Explanation:

Isolating the machine from the network is the best way to identify the source of the attack, because it prevents the malicious traffic from spreading to other devices or reaching the attacker. Isolating the machine can also help preserve the evidence of the attack, such as the malware files, the network connections, the registry entries, or the system logs. By isolating the machine, a technician can safely analyze the machine and determine the source of the attack, such as a phishing email, a compromised website, a removable media, or a network vulnerability.

asked 02/10/2024
Tyler Smith
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first