Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam CFR-410 Topic 4 Question 58 Discussion

Actual exam question for CertNexus's CFR-410 exam
Question #: 58
Topic #: 4
[All CFR-410 Questions]

Which of the following data sources could provide indication of a system compromise involving the exfiltration of data to an unauthorized destination?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Zoila
5 days ago
D) SSL logs are the way to go. Can't hide your secrets when they're all encrypted, right?
upvoted 0 times
...
Jacqueline
8 days ago
A) IPS logs would definitely catch any suspicious activity. Unless the hackers are using invisible ink, of course.
upvoted 0 times
...
Tien
13 days ago
B) DNS logs for sure. That's where you'll see those pesky data thieves trying to phone home.
upvoted 0 times
Jeannine
1 days ago
A) IPS logs might also show signs of a system compromise, but DNS logs are a good indicator too.
upvoted 0 times
...
...

Save Cancel