Which of the follow...
 
Notifications
Clear all

Which of the following should the analyst do?

1 Posts
1 Users
0 Likes
124 Views
(@ferronigiovanni)
Posts: 731
Noble Member
Topic starter
 

A security analyst is investigating malicious traffic from an internal system that attempted to download proxy avoidance software as identified from the firewall logs but the destination IP is blocked and not captured .

Which of the following should the analyst do?

  • A . Shut down the computer
    B. Capture live data using Wireshark
    C. Take a snapshot
    D. Determine if DNS logging is enabled.
    E. Review the network logs.

Show Answer Hide Answer

Suggested Answer: D

Explanation:

The DNS debug log provides extremely detailed data about all DNS information that is sent and received by the DNS server, similar to the data that can be gathered using packet capture tools such as network monitor.

https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn800669(v=ws.11)#:~:text=The%20DNS%20debug%20log%20provides,tools%20such%20as%20network%20monitor.
 
Posted : 15/11/2022 10:29 pm
Topic Tags

Latest CS0-002 V2 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: