Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CS0-003 topic 1 question 194 discussion

Actual exam question from CompTIA's CS0-003
Question #: 194
Topic #: 1
[All CS0-003 Questions]

A laptop that is company owned and managed is suspected to have malware. The company implemented centralized security logging. Which of the following log sources will confirm the malware infection?

  • A. XDR logs
  • B. Firewall legs
  • C. IDS logs
  • D. MFA logs
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
glenndexter
1 week, 3 days ago
Selected Answer: A
Among the options provided, the log source that would most likely confirm the malware infection on the company-owned and managed laptop is: A. XDR logs XDR (Extended Detection and Response) logs aggregate and correlate data from various security sources, such as endpoint detection and response (EDR), network traffic analysis (NTA), and other security tools. These logs provide comprehensive visibility into security events and incidents across the organization's infrastructure. If the laptop is suspected to have malware, the EDR component of the XDR solution would likely generate logs indicating suspicious or malicious behavior on the endpoint. This could include activities such as file modifications, process executions, network connections to known malicious domains, or other indicators of compromise (IOCs) associated with malware infections.
upvoted 2 times
PatrickH
3 days, 9 hours ago
Just wanna say thanks for taking tjhe time to put in so many good, detailed answers.
upvoted 1 times
...
...
HL2020
3 weeks, 2 days ago
Selected Answer: A
I would say A. The laptop could be outside of the company network and an IDS would not have any relevant logs. Only the XDR would have logs in that situation.
upvoted 1 times
...
Eduardoo7
4 weeks ago
Selected Answer: A
XDR - IDS has nothing to do with endpoints
upvoted 1 times
...
CyberJackal
1 month ago
Selected Answer: A
This is XDR logs. XDR and EDR are sometimes interchangeable terms. IDS is traditionally associated with network traffic, and logs are typically collected from networking devices, not user workstations.
upvoted 1 times
...
Bogus1488
1 month, 1 week ago
Selected Answer: A
XDR - eXtended Detection and Response
upvoted 1 times
...
Olubaba
1 month, 2 weeks ago
Selected Answer: C
Intrusion Detection System (IDS) logs are specifically designed to monitor network traffic for suspicious or malicious activity. If the laptop is suspected to have malware, the IDS logs may capture network traffic associated with the malware's behavior, such as communication with command-and-control servers, attempts to exploit vulnerabilities, or unusual patterns of data transfer.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...