Cisco Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) 200-201 Question # 27 Topic 3 Discussion

Cisco Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) 200-201 Question # 27 Topic 3 Discussion

200-201 Exam Topic 3 Question 27 Discussion:
Question #: 27
Topic #: 3

A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?


A.

event name, log source, time, source IP, and host name


B.

protocol, source IP, source port, destination IP, and destination port


C.

event name, log source, time, source IP, and username


D.

protocol, log source, source IP, destination IP, and host name


Get Premium 200-201 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.