New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus CFR-410 Exam - Topic 4 Question 58 Discussion

Actual exam question for CertNexus's CFR-410 exam
Question #: 58
Topic #: 4
[All CFR-410 Questions]

Which of the following data sources could provide indication of a system compromise involving the exfiltration of data to an unauthorized destination?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Novella
2 months ago
Wait, can DNS logs really indicate data exfiltration? Sounds sketchy!
upvoted 0 times
...
Paris
3 months ago
SSL logs might catch encrypted data leaving the network.
upvoted 0 times
...
Kerry
3 months ago
IPS logs can show unusual traffic patterns.
upvoted 0 times
...
Francisca
3 months ago
SQL logs? Not sure how they’d help with that.
upvoted 0 times
...
Azalee
3 months ago
Totally agree, DNS logs are also key for tracking exfiltration.
upvoted 0 times
...
Antonio
3 months ago
SSL logs seem like they might provide some insight, especially if encrypted traffic is going to an unknown destination, but I’m not confident about that.
upvoted 0 times
...
India
4 months ago
I’m a bit confused about SQL logs; I don’t recall them being directly related to data exfiltration, but maybe they could show unauthorized access attempts?
upvoted 0 times
...
Carmen
4 months ago
I remember practicing a question where DNS logs helped identify suspicious domain requests, so I’m leaning towards option B for this one.
upvoted 0 times
...
Vilma
4 months ago
I think IPS logs could be useful since they might show unusual traffic patterns, but I'm not entirely sure if they specifically indicate data exfiltration.
upvoted 0 times
...
Roslyn
4 months ago
This is a good question that really tests our understanding of cybersecurity monitoring and incident detection. I think the key is to focus on the data sources that would most likely capture signs of unauthorized data access or transfer, which points me towards the DNS logs and IPS logs.
upvoted 0 times
...
Marti
5 months ago
I'm a bit confused by this question. SQL logs and SSL logs don't seem as directly relevant to detecting a system compromise. I'm leaning towards either the DNS logs or the IPS logs, but I'm not 100% sure.
upvoted 0 times
...
Flo
5 months ago
Okay, I think I've got this. DNS logs would show any suspicious domain lookups that could indicate data exfiltration, and IPS logs would capture any network traffic that looks like unauthorized access or data transfer. I'm going to go with B and A.
upvoted 0 times
...
Earleen
5 months ago
Hmm, I'm not sure about this one. I know we covered some of this material in class, but I'm having trouble remembering the specifics. I'll have to think it through carefully.
upvoted 0 times
...
Charlene
5 months ago
This looks like a classic cybersecurity question. I'd start by thinking about what kind of data could indicate a system compromise. DNS logs and IPS logs seem like the most relevant options here.
upvoted 0 times
...
Jess
9 months ago
I think both A) IPS logs and B) DNS logs are important for detecting system compromises involving data exfiltration.
upvoted 0 times
...
Leatha
9 months ago
I believe B) DNS logs could also be helpful in detecting unauthorized data exfiltration.
upvoted 0 times
...
Galen
9 months ago
I agree with Princess, IPS logs can show if data is being exfiltrated.
upvoted 0 times
...
Princess
9 months ago
I think A) IPS logs could provide indication of a system compromise.
upvoted 0 times
...
Zoila
10 months ago
D) SSL logs are the way to go. Can't hide your secrets when they're all encrypted, right?
upvoted 0 times
...
Jacqueline
10 months ago
A) IPS logs would definitely catch any suspicious activity. Unless the hackers are using invisible ink, of course.
upvoted 0 times
Fanny
9 months ago
D) SSL logs might show unauthorized data transfer.
upvoted 0 times
...
Tamera
9 months ago
B) DNS logs could also provide indication of data exfiltration.
upvoted 0 times
...
Huey
9 months ago
A) IPS logs would definitely catch any suspicious activity.
upvoted 0 times
...
...
Tien
10 months ago
B) DNS logs for sure. That's where you'll see those pesky data thieves trying to phone home.
upvoted 0 times
Erinn
9 months ago
C) SQL logs and SSL logs may not directly show data exfiltration, but they are still important for monitoring system activity.
upvoted 0 times
...
Barbra
9 months ago
B) Definitely, DNS logs can reveal unauthorized data exfiltration attempts.
upvoted 0 times
...
Jeannine
10 months ago
A) IPS logs might also show signs of a system compromise, but DNS logs are a good indicator too.
upvoted 0 times
...
...

Save Cancel