List of questions
Related questions
Question 10 - CV0-004 discussion
A security analyst reviews the daily logs and notices the following suspicious activity:
The analyst investigates the firewall logs and identities the following:
Which of the following steps should the security analyst take next to resolve this issue? (Select two).
A.
Submit an IT support ticket and request Kali Linux be uninstalled from John Smith's computer
B.
Block all inbound connections on port 4444 and block the IP address 201.101.25.121.
C.
Contact John Smith and request the Ethernet cable attached to the desktop be unplugged
D.
Check the running processes to confirm if a backdoor connection has been established.
E.
Upgrade the Windows x64 operating system on John Smith's computer to the latest version.
F.
Block all outbound connections from the IP address 10.150.71.151.
Your answer:
0 comments
Sorted by
Leave a comment first