exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 594 discussion

Actual exam question from CompTIA's SY0-601
Question #: 594
Topic #: 1
[All SY0-601 Questions]

Sales team members have been receiving threatening voicemail messages and have reported these incidents to the IT security team. Which of the following would be MOST appropriate for the IT security team to analyze?

  • A. Access control
  • B. Syslog
  • C. Session Initiation Protocol traffic logs
  • D. Application logs
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ApplebeesWaiter1122
Highly Voted 1 year, 11 months ago
Selected Answer: C
Since the threatening messages are reported to be voicemail messages, analyzing the Session Initiation Protocol (SIP) traffic logs would be the most appropriate action. SIP is a signaling protocol commonly used for initiating, maintaining, modifying, and terminating real-time communication sessions like voice and video calls over IP networks. Voicemail messages often involve SIP traffic, which includes information about the call setup and signaling details. Analyzing SIP traffic logs can help the IT security team identify the source of the threatening voicemail messages, track the call flow, and gather information about the calling party. This can be crucial for understanding the nature of the threat and taking appropriate actions to mitigate or prevent further incidents.
upvoted 13 times
...
Benrosan
Most Recent 1 year, 5 months ago
Selected Answer: C
Answer C. The one time where's it's acutally more convenient to use the acronym (SIP)...
upvoted 3 times
...
touisuzuki
1 year, 9 months ago
Selected Answer: C
Session Initiation Protocol traffic logs: SIP traffic logs are relevant because they can provide information about the call sessions, including details about the originating and receiving parties, timestamps, call duration, and potentially the content of the SIP messages. Analyzing SIP traffic logs can help identify the source of the threatening voicemail messages and the related call sessions.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...