Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 35 Topic 4 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 35 Topic 4 Discussion

312-49v11 Exam Topic 4 Question 35 Discussion:
Question #: 35
Topic #: 4

Thomas, a cybersecurity analyst, is investigating a potential intrusion into a web server after receiving an alert for suspicious activity. Upon reviewing the IIS logs, he notices an unusually high number of requests coming from the same IP address within a short time period. These requests are spread across various times during the day and seem to target multiple resources on the server. Thomas suspects that the requests may be part of a larger attempt to scan for vulnerabilities or exploit a specific weakness. Which of the following log fields should Thomas focus on to better understand the nature of these requests?


A.

sc-status (Status code)


B.

cs-uri-stem (Requested URI)


C.

cs-ip (Client IP address)


D.

cs-user-agent (User-Agent string)


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.