An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Choose two.)
Changing my answer
Network logs (Option D): These logs can help identify network connections to the command-and-control server and provide information about source IP addresses (the impacted host) and destination IP addresses (the command-and-control server).
Firewall logs (Option E): Firewall logs also track network traffic and can provide valuable information about source and destination IP addresses, helping identify the impacted host and its communication with the command-and-control server.
B. Authentication logs: These logs record user authentication events, including successful and failed login attempts. By analyzing authentication logs, you can determine if unauthorized users accessed the system or if legitimate users' credentials were compromised.
D. Network logs: Network logs record information about network traffic, such as source and destination IP addresses, ports, protocols, and connection attempts. Analyzing network logs can help identify communication with the command-and-control server, revealing which hosts were communicating with it.
I disagree, Command and Control is common in RAT's, which does not need authentication to take control of the system. D and E make more sense, since Command and Control is all about establishing a connection back to the attacker from the victim machine
Option A, "Application logs," may be useful for identifying specific application-related issues, but they might not directly point to the command-and-control server.
Option C, "Error logs," typically record application or system errors, and while they may be helpful in troubleshooting, they might not directly indicate a command-and-control server's presence.
Option E, "Firewall logs," are useful for monitoring and controlling traffic between networks, but they might not directly identify the impacted host without additional context.
Option F, "System logs," provide information about system activities and events, but they may not be the most specific logs for identifying the host communicating with a command-and-control server.
D. Network Logs: Network logs record information about network traffic, including communication between hosts and external entities. By analyzing network logs, you can identify connections to and from the command-and-control server, helping to trace the affected hosts.
E. Firewall Logs: Firewall logs provide details about the traffic that passes through the organization's firewall. They can reveal attempts by hosts to communicate with external servers, including command-and-control servers. Analyzing firewall logs can help identify the hosts involved in the incident and the nature of their communication with the command-and-control server.
By analyzing both network and firewall logs, organizations can gain insight into which hosts within their network may have been compromised or are attempting to establish unauthorized connections with external entities like command-and-control servers.
DE - See the following descriptions Per Dion Training 701 Guide. Key work "analyze impact". The fastest way to check the impact is the network to see if there is a spread and whether the firewall was bypassed.
Firewall Logs monitor network traffic & detect unauthorized access
Network Logs - Records activity and connections
If you're trying to identify the impacted host(s) , then answers A, E & F are out complete (you would need to already know the host). B is out because a C&C Server doesn't need nor use your network's authentication mechanisms.
This one is straightforward.
To find a specific host the network and system logs would be most helpful. Firewall logs would only tell about outside threats and wouldn't point to a specific host on the network.
While the other logs (A. Application, B. Authentication, C. Error, and E. Firewall) can be valuable for investigating various aspects of a cybersecurity incident, they may not provide as direct information about the specific host impacted by the C2 server. Network and system logs are more likely to reveal details about the communication and activities related to the C2 server, which is crucial for identifying the affected host.
When an organization experiences a cybersecurity incident involving a command-and-control (C2) server, the logs that should be analyzed to identify the impacted host are as follows:
D. Network: Network logs can provide information about the connections made to and from the C2 server. Analyzing network logs can help identify the source and destination IP addresses, ports, and communication patterns related to the C2 server. This information can help pinpoint the impacted host.
F. System: System logs on the impacted host can provide information about unusual or suspicious activities, such as system processes, services, or applications that may have been compromised or interacted with the C2 server. Analyzing system logs can help identify the affected system and understand the extent of the compromise.
While the other logs (A. Application, B. Authentication, C. Error, and E. Firewall) can be valuable for investigating various aspects of a cybersecurity incident, they may not provide as direct information about the specific host impacted by the C2 server. Network and system logs are more likely to reveal details about the communication and activities related to the C2 server, which is crucial for identifying the affected host.
Network logs (Option D) can help identify the network connections between the compromised host and the command-and-control server, but they may not directly reveal the identity of the impacted host itself.
System logs (Option F) can provide information about system-level events and activities on the host, which may include logs related to processes or services involved in the incident. While they may not always directly identify the impacted host, they can provide context and details about the host's behavior during the incident.
D: Network logs: Analyzing network logs can help identify communication with the command-and-control server and trace the affected host
E. Firewall logs: Firewall logs can provide insight into potential unauthorized access and identify the source and destination of network traffic, which can help trace the affected host
As usual, I think people are overthinking this. I'm going Network and Firewall. I could see Authentication being correct as well, but the MOST correct are Network and Firewall (IMHO)
To identify the impacted host in a cybersecurity incident involving a command-and-control server, you should focus on analyzing network logs (Option D) and firewall logs (Option E). Both of these logs can provide insights into network traffic, connections, and communication with external servers, which is crucial for identifying the affected host.
Network logs can show you connections to and from the command-and-control server, while firewall logs can reveal attempts to communicate with external servers, including the malicious command-and-control server.
So, the correct options are:
D. Network
E. Firewall
chatgpt:
D. Network Logs: Network logs can provide information about network traffic, connections, and communication patterns. Analyzing network logs can help identify communication with the command-and-control server and trace the affected host.
E. Firewall Logs: Firewall logs can provide details about incoming and outgoing traffic, including attempts to connect to external servers. These logs can help identify communication between the impacted host and the command-and-control server.
While other logs such as authentication logs (option B) and system logs (option F) might also provide relevant information, the network and firewall logs are particularly important in identifying the impacted host in a command-and-control server incident.
B vs. E (Authentication vs. Firewall) - It's a bit trickier. If the question focuses solely on the initial identification of the C2 communication, then the firewall log may have a slight edge because it would log any attempts of an internal machine trying to reach out to an external one, regardless of the nature of that communication. Authentication logs are valuable for understanding lateral movement and potential privilege escalation but may not be the first place to identify a host impacted by C2 communication unless that communication mimics authentication traffic.
That said, the choice between B and E can depend on the specific architecture and logging capabilities of the organization. In many real-world scenarios, both would be scrutinized. For the purpose of this specific question, given the details provided, D and E might be more directly relevant, but an argument for B and D can be made depending on the assumed nature of the C2 communication.
D. Network Logs: Network logs can provide information about network traffic, connections, and communication patterns. Analyzing network logs can help identify communication with the command-and-control server and trace the affected host.
E. Firewall Logs: Firewall logs can provide details about incoming and outgoing traffic, including attempts to connect to external servers. These logs can help identify communication between the impacted host and the command-and-control server.
While other logs such as authentication logs (option B) and system logs (option F) might also provide relevant information, the network and firewall logs are particularly important in identifying the impacted host in a command-and-control server incident.
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
touisuzuki
Highly Voted 1 year, 9 months agoApplebeesWaiter1122
Highly Voted 1 year, 11 months agoshocky377
1 year, 10 months agoApplebeesWaiter1122
1 year, 11 months agoAbdul2107
1 year, 10 months agoGeronemo
Most Recent 1 year, 2 months ago_deleteme_
1 year, 2 months agoBD69
1 year, 2 months agocaseymd85
1 year, 4 months agoLuckyAro
1 year, 8 months agoLuckyAro
1 year, 8 months agoLuckyAro
1 year, 8 months agotouisuzuki
1 year, 9 months agosujon_london
1 year, 9 months agozits88
1 year, 10 months agoflancaster
1 year, 10 months agoCS3000
1 year, 10 months agoAbdul2107
1 year, 10 months agothisguyfucks
1 year, 10 months agoemd
1 year, 10 months ago[Removed]
1 year, 10 months agoemd
1 year, 10 months ago