Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified SOC Analyst (CSA v2) 312-39 Question # 57 Topic 6 Discussion

ECCouncil Certified SOC Analyst (CSA v2) 312-39 Question # 57 Topic 6 Discussion

312-39 Exam Topic 6 Question 57 Discussion:
Question #: 57
Topic #: 6

Pearl is a Level 1 SOC analyst at a global financial institution using SQL Server to store sensitive customer information. She investigates an alert showing multiple failed web app logins from the same IP, followed by a successful login as a server administrator. She then reviews SQL Server logs and finds the attacker used compromised credentials to access the SQL Server database. Which log will help identify whether the intruder performed unauthorized modifications in the database?


A.

Transaction log


B.

Security log


C.

Maintenance log


D.

Audit log


Get Premium 312-39 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.