Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 8 Topic 1 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 8 Topic 1 Discussion

312-49v11 Exam Topic 1 Question 8 Discussion:
Question #: 8
Topic #: 1

During a late-evening review at a financial services firm, analysts suspect that sensitive files are being transferred off the network using a built-in file transfer client on a compromised workstation. The team needs a centralized, non-intrusive way to surface this activity for initial triage without interacting directly with the endpoint. What monitoring action best supports detection of this behavior?


A.

Reviewing endpoint file access logs on the affected workstation


B.

Blocking outbound FTP connections at the firewall


C.

Monitoring aggregate FTP data transfer volumes through a SIEM platform


D.

Capturing live packet data directly from the suspect host


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.