Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CS0-002 Topic 6 Question 73 Discussion

Actual exam question for CompTIA's CS0-002 exam
Question #: 73
Topic #: 6
[All CS0-002 Questions]

A cybersecurity analyst inspects DNS logs on a regular basis to identify possible IOCs that are not triggered by known signatures. The analyst reviews the following log snippet:

Which of the following should the analyst do next based on the information reviewed?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

Janet
7 months ago
You guys are really overthinking this. The simplest solution is to just disconnect the host at 192.168.1.67. That's the one that's clearly accessing the malicious domain, so cutting it off from the network should stop the threat, right? *laughs* I mean, what could possibly go wrong with that approach?
upvoted 0 times
...
Jolanda
7 months ago
Hmm, sinkholing sounds like a good idea, but it might be tricky to pull off, especially if the 8.8.8.8 resolver is not under the analyst's control. Maybe a better approach would be to disallow queries to that resolver altogether. That way, you can at least prevent further communication with the malicious domain, even if you can't completely sinkhole the traffic.
upvoted 0 times
...
Arleen
7 months ago
I'm not so sure about that. Blocking a single domain might not be enough to address the underlying issue. What if there are other malicious domains being used? I think the analyst should consider sinkholing the IP address 102.100.20.20 to get a better understanding of the threat and potentially identify other indicators of compromise.
upvoted 0 times
Tresa
6 months ago
The analyst should consider sinkholing the IP address for a more thorough investigation.
upvoted 0 times
...
Ilene
6 months ago
In this case, sinkholing the IP address could reveal more about the malicious activity.
upvoted 0 times
...
Leeann
6 months ago
It's a proactive measure to take in cybersecurity investigations.
upvoted 0 times
...
Garry
6 months ago
Sinkholing can definitely help in understanding the scope of the problem.
upvoted 0 times
...
Vilma
6 months ago
I agree. It's important to have a comprehensive approach to addressing cybersecurity threats.
upvoted 0 times
...
Junita
6 months ago
That's a good point. Sinkholing could provide more insights into the threat.
upvoted 0 times
...
Joanna
6 months ago
Sinkholing the IP address 102.100.20.20 could help identify other indicators of compromise.
upvoted 0 times
...
...
Ming
7 months ago
This question is tricky, but I think the answer is B - block requests to 'no---thanks.invalid'. The DNS log shows a suspicious domain name that is likely used for malicious purposes, like command and control or data exfiltration. Blocking that domain is the safest option to mitigate the potential threat without disrupting the entire network.
upvoted 0 times
...

Save Cancel