A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?
A. Investigate the firewall logs.
Firewall logs record network traffic, including incoming and outgoing connections. By analyzing these logs, the technician can identify the source of the malicious traffic, such as the IP address of the attacker's machine or the malicious website the user may have visited.
This information can help in further investigation and taking necessary steps to prevent future attacks.
Google Gemini
read question "Which of the following is the best way to identify the source of the attack" asking source of attack, so it would be A firewall logs. It is not asking to resolve issue.
A
How to view firewall logs?
On the main “Windows Firewall with Advanced Security” screen, scroll down until you see the “Monitoring” link. In the Details pane, under “Logging Settings”, click the file path next to “File Name.” The log opens in Notepad.
This section is not available anymore. Please use the main Exam Page.220-1102 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Nate_A
5 months, 3 weeks agofaisal83
7 months, 3 weeks agoRixon
8 months, 2 weeks agoPhilco
8 months, 3 weeks agoNaqeeb1
9 months, 1 week agoschoha8874
9 months, 1 week ago