exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 796 discussion

Actual exam question from CompTIA's SY0-601
Question #: 796
Topic #: 1
[All SY0-601 Questions]

An analyst is reviewing an incident in which a user clicked on a link in a phishing email. Which of the following log sources would the analyst utilize to determine whether the connection was successful?

  • A. Network
  • B. System
  • C. Application
  • D. Authentication
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Yomzie
Highly Voted 1 year, 5 months ago
Hint:: A phishing link in an email leads you where? A URL. A malicious site. Where do you find info about your Internet visits and browsing history? Answer:: Network Logs.
upvoted 16 times
...
johnabayot
Highly Voted 1 year, 5 months ago
Selected Answer: A
Network log sources can show the traffic between the user's device and the phishing website, such as DNS queries, the IP addresses, the port, and the protocols. Network logs can also reveal if the connection was blocked by a firewall or other security tools.
upvoted 9 times
...
salah112
Most Recent 1 year, 4 months ago
Selected Answer: A
A. Network To determine whether the connection resulting from a user clicking on a link in a phishing email was successful, the analyst would typically review network logs. Network logs provide information about network traffic, connections, and communication between systems. By analyzing network logs, the analyst can identify if the user's system made a successful connection to an external server or if there were any unusual or malicious activities.
upvoted 2 times
...
dfc6822
1 year, 5 months ago
A. Network To determine whether the connection was successful after a user clicked on a link in a phishing email, the analyst would typically utilize network logs. Network logs can provide information on connections, traffic, and communication between the user's system and external servers or websites.
upvoted 1 times
...
Hs1208
1 year, 5 months ago
Selected Answer: D
D. HVAC HVAC systems play a crucial role in maintaining appropriate temperature and humidity levels in data centers and other facilities housing IT equipment.
upvoted 2 times
Shouqq_examtopics
1 year, 1 month ago
hahahaha lol
upvoted 1 times
...
f81e1dc
1 year, 2 months ago
Hahaha it happens
upvoted 1 times
...
russian
1 year, 2 months ago
answering the wrong question buddy
upvoted 2 times
...
dfc6822
1 year, 5 months ago
hahahahaha bro is high
upvoted 4 times
...
...
Hs1208
1 year, 5 months ago
Selected Answer: A
A. Network
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...