List of questions
Related questions
Question 78 - CS0-003 discussion
A cybersecurity analyst is reviewing SIEM logs and observes consistent requests originating from an internal host to a blocklisted external server. Which of the following best describes the activity that is
taking place?
A.
Data exfiltration
B.
Rogue device
C.
Scanning
D.
Beaconing
Your answer:
0 comments
Sorted by
Leave a comment first