New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 3 Question 41 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 41
Topic #: 3
[All Cybersecurity-Audit-Certificate Questions]

The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?

Show Suggested Answer Hide Answer
Suggested Answer: D

The presence of known dangerous artifacts like malicious IP addresses or domain names on a network typically indicates that a security breach has occurred or is in progress. These artifacts are often recognized as indicators of compromise (IoCs), which are pieces of forensic data, such as system log entries or files, that identify potentially malicious activity on a system or network. Identifying IoCs is crucial for cybersecurity as it allows organizations to detect breaches quickly and respond to them promptly.


Contribute your Thoughts:

0/2000 characters
Gilma
2 months ago
A and D seem pretty related, but D is more accurate.
upvoted 0 times
...
Dudley
2 months ago
I think it points more towards unauthorized access.
upvoted 0 times
...
Johnna
2 months ago
Definitely helps identify indicators of compromise.
upvoted 0 times
...
Joanne
3 months ago
Surprised this isn't more widely known!
upvoted 0 times
...
Val
3 months ago
System vulnerabilities are a different issue altogether.
upvoted 0 times
...
Margurite
3 months ago
I’m leaning towards unauthorized access, but I also see how it could relate to indicators of compromise. It’s tricky!
upvoted 0 times
...
Joni
3 months ago
I’m a bit confused. Could it be system vulnerabilities? I feel like those are related but not exactly the same as dangerous artifacts.
upvoted 0 times
...
Willie
4 months ago
I remember practicing a question like this where the answer was about indicators of compromise. That seems to fit here too.
upvoted 0 times
...
Hildred
4 months ago
I think this question is about identifying threats, but I'm not sure if it's specifically about data breaches or something else.
upvoted 0 times
...
Loreta
4 months ago
This seems like a good opportunity to apply some of the security concepts we've been learning. I'll try to break down the question and think through the implications of each answer choice.
upvoted 0 times
...
Reita
4 months ago
I'm a little confused by the wording of this question. I'll need to re-read it a few times and consider each answer option to make sure I understand what it's asking.
upvoted 0 times
...
Odette
4 months ago
Okay, I've got this. The discovery of known dangerous artifacts on a network would indicate an "Indicator of compromise", which is the correct answer here.
upvoted 0 times
...
Charlesetta
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to think through the different options carefully to figure out which one best matches the question.
upvoted 0 times
...
Carma
5 months ago
This looks like a straightforward security question. I'll start by considering the key terms like "dangerous artifacts" and "identify" to determine what the correct answer is.
upvoted 0 times
...
Quentin
7 months ago
I'm going with D. Indicator of compromise. Sounds like the most comprehensive option to me. Although, I do wonder if any of these artifacts are cursed or something. Spooky!
upvoted 0 times
Mabel
6 months ago
D) Indicator of compromise
upvoted 0 times
...
Shenika
7 months ago
A) Data breach
upvoted 0 times
...
...
Ryan
8 months ago
I believe it could also point to system vulnerabilities.
upvoted 0 times
...
Sommer
8 months ago
I agree with Lashaunda, it's definitely an indicator of compromise.
upvoted 0 times
...
Lashaunda
8 months ago
I think it helps to identify indicator of compromise.
upvoted 0 times
...
Tequila
8 months ago
Hey, at least they're not asking us to find the hidden treasure! D. Indicator of compromise is my pick.
upvoted 0 times
Kathrine
7 months ago
True, discovering known dangerous artifacts can help prevent unauthorized access to our network.
upvoted 0 times
...
Pamela
7 months ago
I think it's important to always be on the lookout for system vulnerabilities as well.
upvoted 0 times
...
Blondell
7 months ago
I agree, D. Indicator of compromise is the key to identifying dangerous artifacts.
upvoted 0 times
...
...
Noemi
8 months ago
C. Unauthorized access sounds like the right answer. Those artifacts indicate someone or something is accessing the network without permission.
upvoted 0 times
Laquanda
7 months ago
D) Indicator of compromise
upvoted 0 times
...
Annalee
8 months ago
B) System vulnerabilities
upvoted 0 times
...
...
Allene
8 months ago
B. System vulnerabilities makes the most sense to me. Finding those dangerous elements means there are weaknesses in the system that need to be addressed.
upvoted 0 times
...
Joseph
8 months ago
I think the correct answer is D. Indicator of compromise. Identifying known dangerous artifacts on the network is a clear sign that something is wrong and needs to be investigated further.
upvoted 0 times
Lauran
7 months ago
D) Indicator of compromise
upvoted 0 times
...
Vanesa
7 months ago
C) Unauthorized access
upvoted 0 times
...
Ligia
8 months ago
B) System vulnerabilities
upvoted 0 times
...
Franchesca
8 months ago
A) Data breach
upvoted 0 times
...
Vesta
8 months ago
It's important to stay vigilant and monitor for any indicators of compromise to protect the network from potential threats.
upvoted 0 times
...
Ena
8 months ago
Knowing the dangerous artifacts can help us pinpoint where the breach or unauthorized access is coming from.
upvoted 0 times
...
Freeman
8 months ago
I agree, D) Indicator of compromise is the correct answer. It's a red flag that something suspicious is happening on the network.
upvoted 0 times
...
...

Save Cancel