ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 328 - SY0-701 discussion

Report
Export

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).

A.
Application
Answers
A.
Application
B.
Authentication
Answers
B.
Authentication
C.
DHCP
Answers
C.
DHCP
D.
Network
Answers
D.
Network
E.
Firewall
Answers
E.
Firewall
F.
Database
Answers
F.
Database
Suggested answer: C, E

Explanation:

To identify the impacted host in a command-and-control (C2) server incident, the following logs should be analyzed:

DHCP logs: These logs record IP address assignments. By reviewing DHCP logs, an organization can determine which host was assigned a specific IP address during the time of the attack.

Firewall logs: Firewall logs will show traffic patterns, including connections to external C2 servers. Analyzing these logs helps to identify the IP address and port numbers of the communicating host.

Application, Authentication, and Database logs are less relevant in this context because they focus on internal processes and authentication events rather than network traffic involved in a C2 attack.

asked 02/10/2024
Hassene SAADI
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first