Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 2 Question 46 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 46
Topic #: 2
[All CFR-210 Questions]

During a network-based attack, which of the following data sources will provide the BEST data to quickly determine the attacker's point of origin? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Barrett
5 days ago
I believe Firewall logs and WIPS logs could also be useful in determining the attacker's point of origin. They can show network traffic and wireless network activity.
upvoted 0 times
...
Cyril
6 days ago
I agree with Carlee. DNS logs can show the domain names accessed, and IDS/IPS logs can provide details on the attack traffic.
upvoted 0 times
...
Slyvia
6 days ago
DNS logs? Really? That's a bit of a stretch. I'd go for the good old-fashioned firewall and IDS/IPS logs any day.
upvoted 0 times
...
Carlee
7 days ago
I think DNS logs and IDS/IPS logs would be the best data sources.
upvoted 0 times
...
Olive
8 days ago
I believe Firewall logs and WIPS logs could also be helpful in determining the attacker's point of origin.
upvoted 0 times
...
Soledad
9 days ago
Firewall logs and IDS/IPS logs are a no-brainer! That's where you'll find all the juicy details about the attack.
upvoted 0 times
...
Almeta
10 days ago
I agree with Glory. DNS logs can show the domain names accessed, and IDS/IPS logs can detect suspicious activities.
upvoted 0 times
...
Glory
14 days ago
I think DNS logs and IDS/IPS logs would be the best data sources.
upvoted 0 times
...

Save Cancel