Question: A security operations analyst suspects that a malware infection on one of the endpoints may have led to unauthorized access. To identify the root cause
A security operations analyst suspects that a malware infection on one of the endpoints may have led to unauthorized access. To identify the root cause and trace the malware's activities, which combination of data sources should the analyst prioritize for review?
ALogs from applications and antivirus installed on a randomly selected endpoint.
BNetwork logs packet captures, and logs generated by networkbased vulnerability scanners.
CFirewall logs system memory metadata, and automated reports from the SIEM tool.
DEndpoint logs log files generated by the OS components of the affected host computer, and logs from the hostbased intrusion detection system.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
