ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 262 - SY0-701 discussion

Report
Export

An analyst is reviewing an incident in which a user clicked on a link in a phishing email. Which of the following log sources would the analyst utilize to determine whether the connection was successful?

A.
Network
Answers
A.
Network
B.
System
Answers
B.
System
C.
Application
Answers
C.
Application
D.
Authentication
Answers
D.
Authentication
Suggested answer: A

Explanation:

To determine whether the connection was successful after a user clicked on a link in a phishing email, the most relevant log source to analyze would be the network logs. These logs would provide information on outbound and inbound traffic, allowing the analyst to see if the user's system connected to the remote server specified in the phishing link. Network logs can include details such as IP addresses, domains accessed, and the success or failure of connections, which are crucial for understanding the impact of the phishing attempt.

Reference =

CompTIA Security+ SY0-701 Course Content: Domain 04 Security Operations.

CompTIA Security+ SY0-601 Study Guide: Chapter on Incident Response.

asked 02/10/2024
loveneel kataria
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first