Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-89 Exam - Topic 5 Question 90 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 90
Topic #: 5
[All 212-89 Questions]

A cybersecurity analyst at a technology firm discovers suspicious activity on a network segment dedicated to research and development. The initial indicators suggest a possible compromise of several endpoints with potential intellectual property theft. Given the sensitive nature of the data involved, what is the most effective method for the analyst to detect and validate the security incident?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Phung
1 day ago
Haha, just unplug the whole network. That'll stop the breach, right?
upvoted 0 times
...
Felicitas
6 days ago
Network traffic monitoring and analysis. Might catch the attacker in the act.
upvoted 0 times
...
Dominga
11 days ago
Forensic analysis of the affected endpoints. Can't miss any crucial evidence.
upvoted 0 times
...
Mitsue
17 days ago
Incident response plan, for sure. Gotta act fast to contain the breach.
upvoted 0 times
...
Salome
22 days ago
I feel like we should also consider using endpoint detection and response (EDR) solutions to get a clearer picture of the compromise.
upvoted 0 times
...
Beckie
27 days ago
This sounds similar to a practice question we did on incident response. I think the key is to prioritize the endpoints involved first.
upvoted 0 times
...
Mollie
2 months ago
I'm not entirely sure, but I think correlating logs from different endpoints could provide more context about the suspicious activity.
upvoted 0 times
...
Desmond
2 months ago
I remember we discussed using network traffic analysis tools to spot anomalies. That might help in validating the incident.
upvoted 0 times
...
Jesus
2 months ago
Hmm, not sure where I'd start on this one. Validating the security incident seems crucial, so I guess I'd focus on gathering as much data as possible from the affected systems and the network.
upvoted 0 times
...
Vinnie
2 months ago
Alright, let's see. Detecting and validating the incident - that's the key here. I'd probably start with network monitoring and traffic analysis to try to identify the source and scope of the compromise.
upvoted 0 times
...
Thaddeus
2 months ago
Oof, this is a sensitive one with intellectual property at risk. I'd recommend a thorough investigation, maybe even bringing in some specialized incident response expertise to ensure we handle this properly.
upvoted 0 times
...
Bea
3 months ago
Okay, so we need to validate the security incident and detect the potential compromise. I think I'd focus on collecting forensic data from the affected endpoints to analyze for signs of intrusion.
upvoted 0 times
...
Lonny
3 months ago
Hmm, this seems like a tricky one. I'd start by reviewing the network logs and endpoint activity in detail to look for any anomalies or unusual behavior.
upvoted 0 times
...

Save Cancel