Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 2 Question 46 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 46
Topic #: 2
[All CFR-210 Questions]

During a network-based attack, which of the following data sources will provide the BEST data to quickly determine the attacker's point of origin? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Wei
19 days ago
Forget the network logs, I'm going to use my trusty crystal ball to track down the attacker. It's foolproof, I tell you!
upvoted 0 times
Anglea
2 days ago
A) DNS logs and E) IDS/IPS logs are the best data sources to determine the attacker's point of origin.
upvoted 0 times
...
...
Glendora
1 months ago
Hmm, let me see. Firewall logs and IDS/IPS logs, no doubt. Although, I hear the cafeteria's serving some killer tacos today. Just saying, it's a tough choice.
upvoted 0 times
Annamaria
2 days ago
I'm leaning towards firewall logs and IDS/IPS logs as well. But those tacos do sound tempting!
upvoted 0 times
...
Cherri
5 days ago
Definitely, those logs provide the most valuable data during a network-based attack.
upvoted 0 times
...
Chauncey
19 days ago
I agree, firewall logs and IDS/IPS logs are crucial for determining the attacker's point of origin.
upvoted 0 times
...
...
Herminia
2 months ago
Well, well, look at Mr. Fancy Pants over here, thinking he's a network security expert. Firewall and IDS/IPS, of course! What is this, amateur hour?
upvoted 0 times
Cassi
29 days ago
A) DNS logs
upvoted 0 times
...
...
Barrett
2 months ago
I believe Firewall logs and WIPS logs could also be useful in determining the attacker's point of origin. They can show network traffic and wireless network activity.
upvoted 0 times
...
Cyril
2 months ago
I agree with Carlee. DNS logs can show the domain names accessed, and IDS/IPS logs can provide details on the attack traffic.
upvoted 0 times
...
Slyvia
2 months ago
DNS logs? Really? That's a bit of a stretch. I'd go for the good old-fashioned firewall and IDS/IPS logs any day.
upvoted 0 times
Deeanna
26 days ago
I agree, DNS logs might not be as helpful in this situation. System logs could also be useful, but firewall and IDS/IPS logs are key.
upvoted 0 times
...
Justine
1 months ago
True, but I still think firewall logs and IDS/IPS logs are the most reliable sources for quickly determining the attacker's point of origin.
upvoted 0 times
...
Ollie
1 months ago
Firewall logs and IDS/IPS logs are definitely the way to go. They provide the best data for determining the attacker's point of origin.
upvoted 0 times
...
Mitzie
1 months ago
WIPS logs could also provide valuable data in determining the attacker's point of origin. It's important to consider all possible sources of information.
upvoted 0 times
...
Josphine
1 months ago
I agree, DNS logs might not be as helpful in this situation. System logs could also be useful in identifying the attacker.
upvoted 0 times
...
Selma
1 months ago
Firewall logs and IDS/IPS logs are definitely the way to go. They provide the best data for determining the attacker's point of origin.
upvoted 0 times
...
...
Carlee
2 months ago
I think DNS logs and IDS/IPS logs would be the best data sources.
upvoted 0 times
...
Olive
2 months ago
I believe Firewall logs and WIPS logs could also be helpful in determining the attacker's point of origin.
upvoted 0 times
...
Soledad
2 months ago
Firewall logs and IDS/IPS logs are a no-brainer! That's where you'll find all the juicy details about the attack.
upvoted 0 times
...
Almeta
2 months ago
I agree with Glory. DNS logs can show the domain names accessed, and IDS/IPS logs can detect suspicious activities.
upvoted 0 times
...
Glory
2 months ago
I think DNS logs and IDS/IPS logs would be the best data sources.
upvoted 0 times
...

Save Cancel
a