While reviewing web server logs, an analyst notices several entries with the same time stamps, but all contain odd characters in the request line. Which of the following steps should be taken next?
A.
Shut the network down immediately and call the next person in the chain of command.
B.
Determine what attack the odd characters are indicative of.
C.
Utilize the correct attack framework and determine what the incident response will consist of.
D.
Notify the local law enforcement for incident response.
Do we know what the odd characters are indicative of yet? Is this an attack? We need to investigate and determine if this is an incident first before we consult an attack framework.
Y'all need to quit using ChatGPT. The correct choice is C.
NOT A) You can't just shut down an entire network. It hasn't been confirmed to be malicious. This is not a good containment practice.
NOT B) This is part of the incident analysis process. This just tells you what kind of attack it may be. Your attack framework would be able to identify this better (option C).
C. Is correct. Your attack response framework (Kill Chain, MITRE, DIAMOND) will guide your response, and from there, you would begin your incident response, which will include option B and D by the way. You don't just willy nilly take whatever response approach you wish to. Your framework will guide your response.
NOT D) It's not always necessary if you are not regulated. Also, this part of incident response process. Option C would include this and is a better option.
Analyzing web logs with odd characters often points to a potential injection attack, like SQL injection or cross-site scripting (XSS).
Before escalating, it's important to identify the nature of the attack — this helps determine the severity and the proper response.
Jumping to actions like shutdowns (A) or law enforcement notification (D) is premature without confirming what’s going on.
While C (using a framework like MITRE ATT&CK or the NIST IR process) is a good long-term step, it comes after initial triage and identification.
Option C. Utilize the correct attack framework and determine what the incident response will consist ofis also a valid step in the incident response process. However, before utilizing an attack framework and determining the incident response, it is essential to first identify and understand the nature of the attack.
Determining what attack the odd characters are indicative of (Option B) is a more immediate and specific action that helps in identifying the type of attack. Once the attack type is identified, the analyst can then proceed to utilize the appropriate attack framework and determine the incident response plan.
In summary, Option B is a more immediate step that leads to Option C. Both steps are important, but identifying the attack type comes first in the sequence of actions.
the correct response is B; typically, when we have suspicions, we need to investigate further to confirm whether there is a real attack before starting the incident response plan
I’d choose B cause how can you determine what incident response will consist of if you don't even know what type of attack it is first? I get why ppl picked C but still
Essa escolha permite uma abordagem organizada e abrangente, garantindo que o tipo de ataque seja identificado e que os passos apropriados para mitigação e resposta sejam seguidos de acordo com as melhores práticas de segurança.
Analyzing the odd characters in the request line can help determine if they are part of a known attack pattern or if they indicate malicious activity. This step involves investigating the nature of the characters, such as whether they resemble SQL injection attempts, cross-site scripting (XSS) payloads, or other types of injection attacks. Once the nature of the attack is identified, appropriate response actions can be taken, such as implementing security controls to mitigate the attack, blocking malicious IP addresses, or patching vulnerable systems. Options A, C, and D are not suitable as immediate next steps without first understanding the nature and severity of the incident through analysis.
How can you determine what incident response will consist of if you don't even know what type of attack it is first, if it is even an attack at all and not just a false positive?
B. Determine what attack the odd characters are indicative of.
In the context of reviewing web server logs, the most immediate and practical step is to investigate the nature of the odd characters in the request line. This involves understanding the patterns, syntax, and characteristics of these entries to determine if they are indicative of a particular attack or anomaly.
Simply shutting down the network (option A) or notifying law enforcement (option D) without understanding the nature of the issue might be premature and could disrupt normal operations unnecessarily. Utilizing the correct attack framework (option C) may come into play after identifying the attack type, but the initial focus should be on understanding the nature of the odd characters to assess the potential threat.
This section is not available anymore. Please use the main Exam Page.CS0-003 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
LiveLaughToasterBath
Highly Voted 1 year, 5 months ago[Removed]
Highly Voted 1 year, 5 months agof90ecff
Most Recent 2 weeks, 6 days agoZayn911
3 months, 1 week agoWolf541
3 months, 1 week agopassingtoday
3 months, 3 weeks agoThanks_stoneface
4 months, 2 weeks agoLearner213
5 months, 1 week agowajdi
5 months, 3 weeks agoiMo7ed
7 months, 1 week agovoiddraco
9 months, 1 week agovoiddraco
9 months agocartman_sc
11 months, 3 weeks agoGeronemo
11 months, 4 weeks agoBanesTech
1 year agocyberwolfhooah
1 year, 2 months agodaddylonglegs
1 year, 3 months agoRobV
1 year, 4 months agojcm3
1 year, 4 months agodaddylonglegs
1 year, 3 months agobettyboo
1 year, 2 months agohigh_My_name_is
1 year ago