An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?
Hey, I bet the answer is D) Web! You know, because the IDS alert was about 'suspicious traffic', and we all know the web is just one big suspicious place, am I right?
Aha, gotta be C) Network traffic! That's the obvious choice here. Maybe the exam writers are trying to trick us, but I'm sticking with my gut on this one.
Hmm, I think the answer here is C) Network traffic. That's where I'd expect to find information about the network connection that triggered the IDS alert.
Karina
2 months agoHector
11 days agoStevie
17 days agoLaurel
26 days agoNorah
27 days agoWayne
2 months agoGoldie
27 days agoArthur
1 months agoLashon
1 months agoCarry
3 months agoEmiko
1 months agoWilda
1 months agoShala
1 months agoAn
2 months agoMillie
2 months agoHannah
2 months agoDelisa
3 months agoAbel
3 months agoAudria
2 months agoVivienne
2 months agoDyan
2 months agoMargurite
3 months agoJesus
3 months agoSena
3 months agoViola
3 months ago