ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 236 - CS0-003 discussion

Report
Export

An attacker recently gained unauthorized access to a financial institution's database, which contains confidential information. The attacker exfiltrated a large amount of data before being detected and blocked. A security analyst needs to complete a root cause analysis to determine how the attacker was able to gain access. Which of the following should the analyst perform first?

A.
Document the incident and any findings related to the attack for future reference.
Answers
A.
Document the incident and any findings related to the attack for future reference.
B.
Interview employees responsible for managing the affected systems.
Answers
B.
Interview employees responsible for managing the affected systems.
C.
Review the log files that record all events related to client applications and user access.
Answers
C.
Review the log files that record all events related to client applications and user access.
D.
Identify the immediate actions that need to be taken to contain the incident and minimize damage.
Answers
D.
Identify the immediate actions that need to be taken to contain the incident and minimize damage.
Suggested answer: C

Explanation:

In a root cause analysis following unauthorized access, the initial step is usually to review relevant log files. These logs can provide critical information about how and when the attacker gained access.

The first step in a root cause analysis after a data breach is typically to review the logs. This helps the analyst understand how the attacker gained access by providing a detailed record of all events, including unauthorized or abnormal activities. Documenting the incident, interviewing employees, and identifying immediate containment actions are important steps, but they usually follow the initial log review.

asked 02/10/2024
Prabith Balagopalan
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first