New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-82 Exam - Topic 18 Question 31 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 31
Topic #: 18
[All 212-82 Questions]

Brielle. a security professional, was instructed to secure her organization's network from malicious activities. To achieve this, she started monitoring network activities on a control system that collected event data from various sources. During this process. Brielle observed that a malicious actor had logged in to access a network device connected to the organizational network. Which of the following types of events did Brielle identify in the above scenario?

Show Suggested Answer Hide Answer
Suggested Answer: C

Success audit is the type of event that Brielle identified in the above scenario. Success audit is a type of event that records successful attempts to access a network device or resource. Success audit can be used to monitor authorized activities on a network, but it can also indicate unauthorized activities by malicious actors who have compromised credentials or bypassed security controls4.


Contribute your Thoughts:

0/2000 characters
Altha
3 months ago
I agree, success audit seems right here.
upvoted 0 times
...
Buck
3 months ago
Wait, a malicious actor logged in? That's surprising!
upvoted 0 times
...
Crista
3 months ago
Definitely a warning event!
upvoted 0 times
...
Tequila
4 months ago
I think it's more of a failure audit.
upvoted 0 times
...
Karol
4 months ago
Sounds like a success audit to me!
upvoted 0 times
...
Elise
4 months ago
I feel like it has to be a success audit since the actor actually accessed the device, but I need to double-check my notes on this.
upvoted 0 times
...
Carmen
4 months ago
I’m leaning towards warning events because it seems like a potential threat was detected, but I could be wrong.
upvoted 0 times
...
Tayna
4 months ago
I remember practicing a question like this, and I think a failure audit would apply if they were trying to log in unsuccessfully.
upvoted 0 times
...
Allene
5 months ago
I think this might be a success audit since the malicious actor was able to log in, but I'm not entirely sure.
upvoted 0 times
...
Chery
5 months ago
I'm leaning towards success audit as well. The question specifically mentions that Brielle observed the malicious actor logging in, which suggests the event was successfully recorded, even though it was a malicious activity.
upvoted 0 times
...
Elena
5 months ago
Okay, let me think this through. The question states that Brielle observed a malicious actor logging in, so that would indicate an unauthorized access attempt. I think the correct answer is a success audit, since the malicious actor was able to successfully log in.
upvoted 0 times
...
Pearlie
5 months ago
This seems straightforward. The malicious actor logging in to access a network device would be considered a success audit event.
upvoted 0 times
...
Paris
5 months ago
Hmm, I'm a bit unsure here. Is it a success audit or a failure audit? The question mentions a malicious actor, so I'm not sure if that would be considered a success or a failure.
upvoted 0 times
...
Catarina
5 months ago
Hmm, this is an interesting question. I think the key here is to figure out how to best integrate the WAF1 policy with the WebApp1 application. I'm not entirely sure which of these options is the right first step, so I'll need to carefully consider the implications of each choice before making a decision.
upvoted 0 times
...
Antione
5 months ago
This looks straightforward - I'll go with Table, Raw, and List to cover the different data visualization options.
upvoted 0 times
...
Latonia
5 months ago
I think the default port is 8181, but I'm not completely sure. I remember practicing a similar question.
upvoted 0 times
...
Malinda
2 years ago
I think the answer is C) Success audit, because Brielle identified a successful login by a malicious actor, which is an important event to track for security purposes.
upvoted 0 times
...
Cordelia
2 years ago
I'm not sure, but I think it could also be D) Warning, as unauthorized access is a warning sign of a potential security breach.
upvoted 0 times
...
Maryann
2 years ago
I agree with Joaquin, because a successful login by a malicious actor is definitely an important event to monitor.
upvoted 0 times
...
Enola
2 years ago
Haha, looks like Brielle caught the bad guy red-handed! I bet they're kicking themselves for not using a stronger password.
upvoted 0 times
...
Rolland
2 years ago
I agree with Kattie, a successful login by a malicious actor would definitely be a success audit event.
upvoted 0 times
Mable
2 years ago
D) Warning
upvoted 0 times
...
Gail
2 years ago
C) Success audit
upvoted 0 times
...
Lashaunda
2 years ago
B) Error
upvoted 0 times
...
Noah
2 years ago
A) Failure audit
upvoted 0 times
...
...
Kattie
2 years ago
The correct answer is C) Success audit, as the scenario describes a malicious actor successfully logging in and accessing a network device.
upvoted 0 times
Goldie
2 years ago
A: That's right, it indicates a successful event rather than a failure or error.
upvoted 0 times
...
Leslie
2 years ago
B: Yeah, because the malicious actor successfully logged in to access the network device.
upvoted 0 times
...
Krissy
2 years ago
A: I think the answer is C) Success audit.
upvoted 0 times
...
...
Joaquin
2 years ago
I think the answer is C) Success audit.
upvoted 0 times
...

Save Cancel