Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CS0-002 Topic 6 Question 73 Discussion

Actual exam question for CompTIA's CS0-002 exam
Question #: 73
Topic #: 6
[All CS0-002 Questions]

A cybersecurity analyst inspects DNS logs on a regular basis to identify possible IOCs that are not triggered by known signatures. The analyst reviews the following log snippet:

Which of the following should the analyst do next based on the information reviewed?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

Janet
1 years ago
You guys are really overthinking this. The simplest solution is to just disconnect the host at 192.168.1.67. That's the one that's clearly accessing the malicious domain, so cutting it off from the network should stop the threat, right? *laughs* I mean, what could possibly go wrong with that approach?
upvoted 0 times
...
Jolanda
1 years ago
Hmm, sinkholing sounds like a good idea, but it might be tricky to pull off, especially if the 8.8.8.8 resolver is not under the analyst's control. Maybe a better approach would be to disallow queries to that resolver altogether. That way, you can at least prevent further communication with the malicious domain, even if you can't completely sinkhole the traffic.
upvoted 0 times
...
Arleen
1 years ago
I'm not so sure about that. Blocking a single domain might not be enough to address the underlying issue. What if there are other malicious domains being used? I think the analyst should consider sinkholing the IP address 102.100.20.20 to get a better understanding of the threat and potentially identify other indicators of compromise.
upvoted 0 times
Tresa
1 years ago
The analyst should consider sinkholing the IP address for a more thorough investigation.
upvoted 0 times
...
Ilene
1 years ago
In this case, sinkholing the IP address could reveal more about the malicious activity.
upvoted 0 times
...
Leeann
1 years ago
It's a proactive measure to take in cybersecurity investigations.
upvoted 0 times
...
Garry
1 years ago
Sinkholing can definitely help in understanding the scope of the problem.
upvoted 0 times
...
Vilma
1 years ago
I agree. It's important to have a comprehensive approach to addressing cybersecurity threats.
upvoted 0 times
...
Junita
1 years ago
That's a good point. Sinkholing could provide more insights into the threat.
upvoted 0 times
...
Joanna
1 years ago
Sinkholing the IP address 102.100.20.20 could help identify other indicators of compromise.
upvoted 0 times
...
...
Ming
1 years ago
This question is tricky, but I think the answer is B - block requests to 'no---thanks.invalid'. The DNS log shows a suspicious domain name that is likely used for malicious purposes, like command and control or data exfiltration. Blocking that domain is the safest option to mitigate the potential threat without disrupting the entire network.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77