ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 94 - SY0-701 discussion

Report
Export

A Chief Information Security Officer wants to monitor the company's servers for SQLi attacks and allow for comprehensive investigations if an attack occurs. The company uses SSL decryption to allow traffic monitoring. Which of the following strategies would best accomplish this goal?

A.
Logging all NetFlow traffic into a SIEM
Answers
A.
Logging all NetFlow traffic into a SIEM
B.
Deploying network traffic sensors on the same subnet as the servers
Answers
B.
Deploying network traffic sensors on the same subnet as the servers
C.
Logging endpoint and OS-specific security logs
Answers
C.
Logging endpoint and OS-specific security logs
D.
Enabling full packet capture for traffic entering and exiting the servers
Most voted
Answers (4)
Most voted
D.
Enabling full packet capture for traffic entering and exiting the servers
Suggested answer: D

Explanation:

Full packet capture is a technique that records all network traffic passing through a device, such as a router or firewall. It allows for detailed analysis and investigation of network events, such as SQLi attacks, by providing the complete content and context of the packets. Full packet capture can help identify the source, destination, payload, and timing of an SQLi attack, as well as the impact on the server and database. Logging NetFlow traffic, network traffic sensors, and endpoint and OS-specific security logs can provide some information about network activity, but they do not capture the full content of the packets, which may limit the scope and depth of the investigation.

Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 372-373

asked 02/10/2024
Jesus De Leon Luis
47 questions
User
Your answer:
6 comments
Sorted by
Up
2
Down
User
Wilker Aguiar

Edited 19 days ago

Voted D

The best strategy to monitor for SQL injection (SQLi) attacks and enable comprehensive investigations is D

Reply
Reply
Report

Up
1
Down
User
Nikolay Yankov

Edited 19 days ago

Voted D

To monitor for SQL Injection (SQLi) attacks and conduct comprehensive investigations, capturing and analyzing all traffic entering and exiting the servers is essential. Full packet capture allows the security team to examine the actual data transmitted, including the raw HTTP/S requests that could contain malicious SQL injection payloads. => D

Reply
Reply
Report

User
tho nguyen

Edited 19 days ago

Like D

UpVote
0
DownVote
0
Reply
Reply
Report

Up
1
Down
User
Robert Fox

Edited 19 days ago

Voted D

D correct

Reply
Reply
Report

Up
1
Down
User
pedro blanco

Edited 19 days ago

Voted D

D.Enabling full packet capture for traffic e....

Reply
Reply
Report

User
Cao Trung Kiên

Edited 19 days ago

D correct

UpVote
1
DownVote
0
Reply
Reply
Report