Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CS0-002 Topic 6 Question 73 Discussion

Actual exam question for CompTIA's CS0-002 exam
Question #: 73
Topic #: 6
[All CS0-002 Questions]

A cybersecurity analyst inspects DNS logs on a regular basis to identify possible IOCs that are not triggered by known signatures. The analyst reviews the following log snippet:

Which of the following should the analyst do next based on the information reviewed?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

Janet
1 years ago
You guys are really overthinking this. The simplest solution is to just disconnect the host at 192.168.1.67. That's the one that's clearly accessing the malicious domain, so cutting it off from the network should stop the threat, right? *laughs* I mean, what could possibly go wrong with that approach?
upvoted 0 times
...
Jolanda
1 years ago
Hmm, sinkholing sounds like a good idea, but it might be tricky to pull off, especially if the 8.8.8.8 resolver is not under the analyst's control. Maybe a better approach would be to disallow queries to that resolver altogether. That way, you can at least prevent further communication with the malicious domain, even if you can't completely sinkhole the traffic.
upvoted 0 times
...
Arleen
1 years ago
I'm not so sure about that. Blocking a single domain might not be enough to address the underlying issue. What if there are other malicious domains being used? I think the analyst should consider sinkholing the IP address 102.100.20.20 to get a better understanding of the threat and potentially identify other indicators of compromise.
upvoted 0 times
Tresa
11 months ago
The analyst should consider sinkholing the IP address for a more thorough investigation.
upvoted 0 times
...
Ilene
12 months ago
In this case, sinkholing the IP address could reveal more about the malicious activity.
upvoted 0 times
...
Leeann
12 months ago
It's a proactive measure to take in cybersecurity investigations.
upvoted 0 times
...
Garry
12 months ago
Sinkholing can definitely help in understanding the scope of the problem.
upvoted 0 times
...
Vilma
12 months ago
I agree. It's important to have a comprehensive approach to addressing cybersecurity threats.
upvoted 0 times
...
Junita
12 months ago
That's a good point. Sinkholing could provide more insights into the threat.
upvoted 0 times
...
Joanna
12 months ago
Sinkholing the IP address 102.100.20.20 could help identify other indicators of compromise.
upvoted 0 times
...
...
Ming
1 years ago
This question is tricky, but I think the answer is B - block requests to 'no---thanks.invalid'. The DNS log shows a suspicious domain name that is likely used for malicious purposes, like command and control or data exfiltration. Blocking that domain is the safest option to mitigate the potential threat without disrupting the entire network.
upvoted 0 times
...

Save Cancel