Prev Question
Next Question

HOTSPOT
A security analyst suspects that a workstation may be beaconing to a command and control server. You must inspect the logs from the company’s web proxy server and the firewall to determine the best course of action to take in order to neutralize the threat with minimum impact to the organization.
Instructions:
If at any time you would like to bring back the initial state of the simulation, please select the Reset button.
When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.
Hot Area:
5a7833092696d - You must inspect the logs from the company web proxy

Answer: See the explanation.

Explanation:
5a78330960338 - You must inspect the logs from the company web proxy

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *