exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 585 discussion

Actual exam question from CompTIA's SY0-701
Question #: 585
Topic #: 1
[All SY0-701 Questions]

A security analyst notices an increase in port scans on the edge of the corporate network. Which of the following logs should the analyst check to obtain the attacker’s source IP address?

  • A. OS security
  • B. Firewall
  • C. Application
  • D. Endpoint
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
addcomptia
3 weeks, 1 day ago
Selected Answer: B
B. Firewall Explanation: Firewall logs monitor and record traffic that passes through the network perimeter. They typically include source IP addresses, destination ports, protocols, and whether the traffic was allowed or blocked. Since port scans are a type of network reconnaissance, the firewall is the best place to identify external IPs attempting to scan ports. Other Options: A. OS security – Logs events on the local system (e.g., logins, policy changes), not ideal for network-level scans. C. Application – Focuses on app-specific events (e.g., errors, user activity), unlikely to capture port scans. D. Endpoint – May log network activity but usually doesn't capture full scan details like a perimeter firewall would. Correct answer: B. Firewall
upvoted 3 times
...
sergezaza83
3 weeks, 2 days ago
Selected Answer: B
Firewall logs are the best source to review when investigating port scans because: Firewalls sit at the network edge and are designed to log all inbound and outbound connection attempts, including scans. They record key details like: Source IP address Destination port Action taken (allowed/blocked)
upvoted 2 times
...
Focsmind11
3 weeks, 2 days ago
Selected Answer: B
A firewall log captures network traffic activity at the edge of a network, including: Port scan attempts Source and destination IP addresses Ports and protocols used Allow/Deny actions So, if a port scan is detected, the firewall log is the most appropriate place to check for the attacker’s source IP address.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...