ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 290 - SY0-601 discussion

Report
Export

Which of the following can be used to detect a hacker who is stealing company data over port 80?

A.
Web application scan
Answers
A.
Web application scan
B.
Threat intelligence
Answers
B.
Threat intelligence
C.
Log aggregation
Answers
C.
Log aggregation
D.
Packet capture
Answers
D.
Packet capture
Suggested answer: D

Explanation:

Using a SIEM tool to monitor network traffic in real-time and detect any anomalies or malicious activities

Monitoring all network protocols and ports to detect suspicious volumes of traffic or connections to uncommon IP addresses

Monitoring for outbound traffic patterns that indicate malware communication with command and control servers, such as beaconing or DNS tunneling

Using a CASB tool to control access to cloud resources and prevent data leaks or downloads Encrypting data at rest and in transit and enforcing strong authentication and authorization policies

asked 02/10/2024
Chad Remick
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first