exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 281 discussion

Actual exam question from CompTIA's SY0-601
Question #: 281
Topic #: 1
[All SY0-601 Questions]

During a security incident investigation, an analyst consults the company’s SIEM and sees an event concerning high traffic to a known, malicious command-and-control server. The analyst would like to determine the number of company workstations that may be impacted by this issue. Which of the following can provide this information?

  • A. WAF logs
  • B. DNS logs
  • C. System logs
  • D. Application logs
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
rodwave
Highly Voted 2 years, 7 months ago
Selected Answer: B
Answer: DNS DNS logs can contain a record for every query and response. It can show the IP addresses and domain names that your system should/shouldn't be communicating with, it can reveal malware calling out to its command-and-control server, or data transfers to non-company locations. This is one of the reasons why DNS logs are some of the most valuable logs to import into a SIEM system.
upvoted 36 times
lizb7223
2 years, 5 months ago
DNS logs https://www.geeksforgeeks.org/top-9-common-security-log-sources/?ref=gcse number 9 states that DNS logs do address command and control as well.
upvoted 3 times
...
...
ksave
Highly Voted 2 years, 7 months ago
Selected Answer: C
System logs contain logs from multiple source and therefore should provide all the impacted workstations.
upvoted 7 times
...
Grumpy_Old_Coot
Most Recent 1 year, 5 months ago
Selected Answer: B
The correct answer is 'B' and pray that your SysAdmins actually have DNS logging and NTP Clients enabled at the workstation level.
upvoted 2 times
...
sujon_london
1 year, 10 months ago
Selected Answer: B
This explanation may helps DNS logs (Domain Name System logs): DNS logs record the domain name resolutions made by devices on the network. Since the analyst is trying to determine the number of company workstations impacted by traffic to a malicious server, DNS logs could be useful. If workstations are making DNS requests to the malicious command-and-control server, these logs can help identify the affected workstations.
upvoted 3 times
...
Selected Answer: B
DNS logs can provide valuable information in determining the number of company workstations that may be impacted by the issue. By analyzing the DNS logs, the analyst can identify the workstations that have made DNS requests or connections to the known malicious command-and-control server. This can help in estimating the scope of the impact and identifying potentially compromised workstations.
upvoted 5 times
...
Navigator
2 years, 1 month ago
Selected Answer: B
Perfect answer is B System logs do not provide info about network activities I suppose.
upvoted 1 times
...
Bl1024
2 years, 1 month ago
Selected Answer: C
The q says "known" C2 server, byt some of them use only IP without domain. Also, DNS in not always config. to collest host logs. The BEST way would be the end point system logs. Mohttps://securityintelligence.comow-to-leverage-log-services-analyze-cc-traffic/st malware will use a Domain Name System (DNS) to resolve a C&C server address. The log files of your internal DNS server are a crucial source of information. Make sure they contain the client queries and, ideally, the answer that was returned. Not all malware will make use of DNS to reach the C&C servers; sometimes it will reach out directly via an IP address. Note that DNS traffic itself can also be used as a communication channel.
upvoted 1 times
Bl1024
2 years, 1 month ago
The correct link: https://securityintelligence.com/how-to-leverage-log-services-to-analyze-cc-traffic/
upvoted 1 times
...
...
Yawannawanka
2 years, 2 months ago
Selected Answer: B
B. DNS logs can provide information about the number of company workstations that may be impacted by high traffic to a known, malicious command-and-control server. DNS logs can provide information on the domain names that are being resolved by the workstations in the network. If a workstation is communicating with a known, malicious command-and-control server, its DNS logs may show DNS queries and responses to the domain name associated with the server. By analyzing the DNS logs, an analyst can determine the number of workstations that are communicating with the malicious server and take appropriate actions to mitigate the issue. WAF logs (option A) may provide information on web traffic patterns and attacks, but they may not be directly related to identifying the workstations that are communicating with a malicious command-and-control server. System logs (option C) and application logs (option D) may provide information on events and activities occurring on individual workstations, but they may not provide a holistic view of the network and may not be directly related to identifying the workstations that are communicating with a malicious command-and-control server.
upvoted 2 times
...
clean_it_up_janny
2 years, 2 months ago
Are we assuming the C2 server has a domain name? It could just be a static IP address that doesn't communicate with a DNS server, which would likely make it C.
upvoted 2 times
...
ramesh2022
2 years, 4 months ago
Selected Answer: C
C. System logs can provide the analyst with the number of company workstations that may be impacted by this issue. System logs contain information about the activities and events taking place on a computer system, including traffic to and from malicious command-and-control servers. By reviewing the system logs, the analyst can determine the number of workstations that may have been impacted by the security incident.
upvoted 1 times
...
Lv2023
2 years, 6 months ago
Selected Answer: B
DNS event logs can hold a variety of information that may supply useful security intelligence, such as: The types of queries a host has made to DNS. Hosts that are in communication with suspicious IP address ranges or domains.
upvoted 2 times
...
johnajwer
2 years, 7 months ago
Selected Answer: C
Answer is C B is incorrect as we are dealing with a command-and-control server. System logs are vital for this.
upvoted 3 times
Sandon
2 years, 7 months ago
Why does change the answer? Seems like DNS logs would still tell you which workstations connected to it.
upvoted 2 times
Sandon
2 years, 5 months ago
I take it back, you're correct
upvoted 2 times
...
...
...
carpathia
2 years, 7 months ago
Selected Answer: B
DNS logs would contain that info. System logs don't necessarely.
upvoted 4 times
...
atrax
2 years, 7 months ago
Selected Answer: C
System logs or Syslogs is correct.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...