A SOC receives several alerts indicating user accounts are connecting to the company's identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?
Intrusion Detection Systems (IDS) logs provide visibility into network traffic patterns and can help detect insecure or unusual connections. These logs will show if non-secure protocols are used, potentially revealing exposed credentials. According to CompTIA CySA+, IDS logs are essential for identifying malicious activity related to communications and network intrusions. Options like DNS (A) and tcpdump (B) provide network details, but IDS specifically monitors for intrusions and unusual activities relevant to security incidents.
Eura
12 days agoSheridan
14 days agoMarge
4 days agoRebecka
1 months agoLynna
17 days agoWillard
21 days agoLorrie
26 days agoTerrilyn
1 months agoKris
2 months agoAdell
9 days agoTheron
14 days agoCora
16 days agoTequila
1 months agoTora
2 months agoMeaghan
2 months ago