Question: 8 9 . 7 % complete Question An incident response analyst investigates a suspected network breach in the organization. With access to a Security Information
complete
Question
An incident response analyst investigates a suspected network breach in the organization. With access to a Security Information and Event Management SIEM tool that aggregates and correlates data from multiple sources, which combination of data sources should the analyst primarily consider to trace the origin and pathway of the breach?
ATrace the origin through packet captures, operating system OSspecific security logs and application logs
BTrace the origin through firewall logs network logs and automated SIEM reports to identify suspicious activities and potential breach pathways.
CTrace the origin through authorized activities on endpoint logs metadata, and automated reports on enduser systems
DTrace the origin through information from activities on firewall logs network logs and application logs
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
