DownloadCompTIASecurity+SY0-701Dumpsforpreparation
16/20
goteleport.com,3:TheImportanceOfBastionHostsInNetworkSecurity,4:Whatisthenetwork
perimeter?|Cloudflare,5:WhatisaWAF?|WebApplicationFirewallexplained,6:[Whatissingle
sign-on(SSO)?-DefinitionfromWhatIs.com]
22.AsecurityanalystisreviewingalertsintheSIEMrelatedtopotentialmaliciousnetworktrafficcoming
fromanemployee’scorporatelaptop.Thesecurityanalysthasdeterminedthatadditionaldataaboutthe
executablerunningonthemachineisnecessarytocontinuetheinvestigation.
Whichofthefollowinglogsshouldtheanalystuseasadatasource?
A.Application
B.IPS/IDS
C.Network
D.Endpoint
Answer:D
Explanation:
Anendpointlogisafilethatcontainsinformationabouttheactivitiesandeventsthatoccuronan
end-userdevice,suchasalaptop,desktop,tablet,orsmartphone.Endpointlogscanprovidevaluable
dataforsecurityanalysts,suchastheprocessesrunningonthedevice,thenetworkconnections
established,thefilesaccessedormodified,theuseractionsperformed,andtheapplicationsinstalledor
updated.Endpointlogscanalsorecordthedetailsofanyexecutablefilesrunningonthedevice,suchas
thename,path,size,hash,signature,andpermissionsoftheexecutable.
Anapplicationlogisafilethatcontainsinformationabouttheeventsthatoccurwithinasoftware
application,suchaserrors,warnings,transactions,orperformancemetrics.Applicationlogscanhelp
developersandadministratorstroubleshootissues,optimizeperformance,andmonitoruserbehavior.
However,applicationlogsmaynotprovideenoughinformationabouttheexecutablefilesrunningonthe
device,especiallyiftheyaremaliciousorunknown.
AnIPS/IDSlogisafilethatcontainsinformationaboutthenetworktrafficthatismonitoredandanalyzed
byanintrusionpreventionsystem(IPS)oranintrusiondetectionsystem(IDS).IPS/IDSlogscanhelp
securityanalystsidentifyandblockpotentialattacks,suchasexploitattempts,denial-of-service(DoS)
attacks,ormaliciousscans.However,IPS/IDSlogsmaynotprovideenoughinformationaboutthe
executablefilesrunningonthedevice,especiallyiftheyareencrypted,obfuscated,oruselegitimate
protocols.
Anetworklogisafilethatcontainsinformationaboutthenetworkactivityandcommunicationthatoccurs
betweendevices,suchasIPaddresses,ports,protocols,packets,orbytes.Networklogscanhelp
securityanalystsunderstandthenetworktopology,trafficpatterns,andbandwidthusage.
However,networklogsmaynotprovideenoughinformationabouttheexecutablefilesrunningonthe
device,especiallyiftheyarehidden,spoofed,oruseproxyservers.
Therefore,thebestlogtypetouseasadatasourceforadditionalinformationabouttheexecutable
runningonthemachineistheendpointlog,asitcanprovidethemostrelevantanddetaileddataabout
theexecutablefileanditsbehavior.
Reference=
https://www.crowdstrike.com/cybersecurity-101/observability/application-log/
https://owasp.org/www-project-proactive-controls/v3/en/c9-security-logging
23.Acyberoperationsteaminformsasecurityanalystaboutanewtacticmaliciousactorsareusingto