An analyst investigates an IDS alert and confirms suspicious traffic to a known malicious IP. What Enterprise Security data model would they use to investigate which process initiated the network connection?
Hey, I bet the answer is D) Web! You know, because the IDS alert was about 'suspicious traffic', and we all know the web is just one big suspicious place, am I right?
Aha, gotta be C) Network traffic! That's the obvious choice here. Maybe the exam writers are trying to trick us, but I'm sticking with my gut on this one.
Hmm, I think the answer here is C) Network traffic. That's where I'd expect to find information about the network connection that triggered the IDS alert.
Karina
1 months agoLaurel
7 days agoNorah
8 days agoWayne
2 months agoGoldie
8 days agoArthur
15 days agoLashon
20 days agoCarry
2 months agoEmiko
13 days agoWilda
14 days agoShala
21 days agoAn
29 days agoMillie
1 months agoHannah
2 months agoDelisa
2 months agoAbel
2 months agoAudria
1 months agoVivienne
1 months agoDyan
2 months agoMargurite
2 months agoJesus
3 months agoSena
3 months agoViola
3 months ago