List of questions
Related questions
Question 118 - SY0-601 discussion
During an investigation, the incident response team discovers that multiple administrator accounts were suspected of being compromised. The host audit logs indicate a repeated brute-force attack on a single administrator account followed by suspicious logins from unfamiliar geographic locations. Which of the following data sources would be BEST to use to assess the accounts impacted by this attack?
A.
User behavior analytics
B.
Dump files
C.
Bandwidth monitors
D.
Protocol analyzer output
Your answer:
0 comments
Sorted by
Leave a comment first