Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 2 Question 46 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 46
Topic #: 2
[All CFR-210 Questions]

During a network-based attack, which of the following data sources will provide the BEST data to quickly determine the attacker's point of origin? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Wei
1 months ago
Forget the network logs, I'm going to use my trusty crystal ball to track down the attacker. It's foolproof, I tell you!
upvoted 0 times
Alethea
10 days ago
B) System logs and D) Firewall logs can also provide valuable information in tracking down the attacker.
upvoted 0 times
...
Anglea
15 days ago
A) DNS logs and E) IDS/IPS logs are the best data sources to determine the attacker's point of origin.
upvoted 0 times
...
...
Glendora
2 months ago
Hmm, let me see. Firewall logs and IDS/IPS logs, no doubt. Although, I hear the cafeteria's serving some killer tacos today. Just saying, it's a tough choice.
upvoted 0 times
Annamaria
15 days ago
I'm leaning towards firewall logs and IDS/IPS logs as well. But those tacos do sound tempting!
upvoted 0 times
...
Cherri
18 days ago
Definitely, those logs provide the most valuable data during a network-based attack.
upvoted 0 times
...
Chauncey
1 months ago
I agree, firewall logs and IDS/IPS logs are crucial for determining the attacker's point of origin.
upvoted 0 times
...
...
Herminia
2 months ago
Well, well, look at Mr. Fancy Pants over here, thinking he's a network security expert. Firewall and IDS/IPS, of course! What is this, amateur hour?
upvoted 0 times
Carma
9 days ago
C) WIPS logs
upvoted 0 times
...
Romana
13 days ago
B) System logs
upvoted 0 times
...
Cassi
1 months ago
A) DNS logs
upvoted 0 times
...
...
Barrett
2 months ago
I believe Firewall logs and WIPS logs could also be useful in determining the attacker's point of origin. They can show network traffic and wireless network activity.
upvoted 0 times
...
Cyril
2 months ago
I agree with Carlee. DNS logs can show the domain names accessed, and IDS/IPS logs can provide details on the attack traffic.
upvoted 0 times
...
Slyvia
2 months ago
DNS logs? Really? That's a bit of a stretch. I'd go for the good old-fashioned firewall and IDS/IPS logs any day.
upvoted 0 times
Deeanna
1 months ago
I agree, DNS logs might not be as helpful in this situation. System logs could also be useful, but firewall and IDS/IPS logs are key.
upvoted 0 times
...
Justine
2 months ago
True, but I still think firewall logs and IDS/IPS logs are the most reliable sources for quickly determining the attacker's point of origin.
upvoted 0 times
...
Ollie
2 months ago
Firewall logs and IDS/IPS logs are definitely the way to go. They provide the best data for determining the attacker's point of origin.
upvoted 0 times
...
Mitzie
2 months ago
WIPS logs could also provide valuable data in determining the attacker's point of origin. It's important to consider all possible sources of information.
upvoted 0 times
...
Josphine
2 months ago
I agree, DNS logs might not be as helpful in this situation. System logs could also be useful in identifying the attacker.
upvoted 0 times
...
Selma
2 months ago
Firewall logs and IDS/IPS logs are definitely the way to go. They provide the best data for determining the attacker's point of origin.
upvoted 0 times
...
...
Carlee
2 months ago
I think DNS logs and IDS/IPS logs would be the best data sources.
upvoted 0 times
...
Olive
2 months ago
I believe Firewall logs and WIPS logs could also be helpful in determining the attacker's point of origin.
upvoted 0 times
...
Soledad
2 months ago
Firewall logs and IDS/IPS logs are a no-brainer! That's where you'll find all the juicy details about the attack.
upvoted 0 times
...
Almeta
2 months ago
I agree with Glory. DNS logs can show the domain names accessed, and IDS/IPS logs can detect suspicious activities.
upvoted 0 times
...
Glory
3 months ago
I think DNS logs and IDS/IPS logs would be the best data sources.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77