Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 2 Question 46 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 46
Topic #: 2
[All CFR-210 Questions]

During a network-based attack, which of the following data sources will provide the BEST data to quickly determine the attacker's point of origin? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Herminia
6 days ago
Well, well, look at Mr. Fancy Pants over here, thinking he's a network security expert. Firewall and IDS/IPS, of course! What is this, amateur hour?
upvoted 0 times
...
Barrett
14 days ago
I believe Firewall logs and WIPS logs could also be useful in determining the attacker's point of origin. They can show network traffic and wireless network activity.
upvoted 0 times
...
Cyril
15 days ago
I agree with Carlee. DNS logs can show the domain names accessed, and IDS/IPS logs can provide details on the attack traffic.
upvoted 0 times
...
Slyvia
15 days ago
DNS logs? Really? That's a bit of a stretch. I'd go for the good old-fashioned firewall and IDS/IPS logs any day.
upvoted 0 times
Josphine
3 days ago
I agree, DNS logs might not be as helpful in this situation. System logs could also be useful in identifying the attacker.
upvoted 0 times
...
Selma
4 days ago
Firewall logs and IDS/IPS logs are definitely the way to go. They provide the best data for determining the attacker's point of origin.
upvoted 0 times
...
...
Carlee
16 days ago
I think DNS logs and IDS/IPS logs would be the best data sources.
upvoted 0 times
...
Olive
17 days ago
I believe Firewall logs and WIPS logs could also be helpful in determining the attacker's point of origin.
upvoted 0 times
...
Soledad
18 days ago
Firewall logs and IDS/IPS logs are a no-brainer! That's where you'll find all the juicy details about the attack.
upvoted 0 times
...
Almeta
19 days ago
I agree with Glory. DNS logs can show the domain names accessed, and IDS/IPS logs can detect suspicious activities.
upvoted 0 times
...
Glory
23 days ago
I think DNS logs and IDS/IPS logs would be the best data sources.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77