Which of the following BEST provides insight into where…

The network administrator at an enterprise reported a large data leak. One compromised server was used to
aggregate data from several critical application servers and send it out to the Internet using HTTPS. Uponinvestigation, there have been no user logins over the previous week and the endpoint protection software is
not reporting any issues. Which of the following BEST provides insight into where the compromised server
collected the information?

The network administrator at an enterprise reported a large data leak. One compromised server was used to
aggregate data from several critical application servers and send it out to the Internet using HTTPS. Uponinvestigation, there have been no user logins over the previous week and the endpoint protection software is
not reporting any issues. Which of the following BEST provides insight into where the compromised server
collected the information?

A.
Review the flow data against each server’s baseline communications profile.

B.
Configure the server logs to collect unusual activity including failed logins and restarted services.

C.
Correlate data loss prevention logs for anomalous communications from the server.

D.
Setup a packet capture on the firewall to collect all of the server communications.



Leave a Reply 0

Your email address will not be published. Required fields are marked *