Exam4Training

Which of the following is the best way for the security analyst to respond?

A security analyst is monitoring a company’s network traffic and finds ping requests going to accounting and human resources servers from a SQL server. Upon investigation, the analyst discovers a technician responded to potential network connectivity issues.

Which of the following is the best way for the security analyst to respond?
A . Report this activity as a false positive, as the activity is legitimate.
B . Isolate the system and begin a forensic investigation to determine what was compromised.
C . Recommend network segmentation to the management team as a way to secure the various environments.
D . Implement host-based firewalls on all systems to prevent ping sweeps in the future.

Answer: A

Explanation:

Reporting this activity as a false positive, as the activity is legitimate, is the best way for the security analyst to respond. A false positive is a condition in which harmless traffic is classified as a potential network attack by a security monitoring tool. Ping requests are a common network diagnostic tool that can be used to test network connectivity issues. The technician who responded to potential network connectivity issues was performing a legitimate task and did not pose any threat to the accounting and human resources servers.

Reference: https://www.techopedia.com/definition/10339/memory-dump

Latest CS0-003 Dumps Valid Version with 128 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version