اختبار شهادة امن المعلومات CompTIA Security+

السؤال 1015 من 1098

كل الأسئلة

A company suffered a critical incident where 30GB of data was exfiltrated from the corporate network. Which of the following actions is the most efficient way to identify where the system data was exfiltrated from and what location the attacker sent the data to?

الخيارات

  • A Analyze firewall and network logs for large amounts of outbound traffic to external IP addresses or domains
  • B Analyze IPS and IDS logs to find the IP addresses used by the attacker for reconnaissance scans
  • C Analyze endpoint and application logs to see whether file-sharing programs were running on the company systems
  • D Analyze external vulnerability scans and automated reports to identify the systems the attacker could have exploited a remote code vulnerability

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.