Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 111 Topic 12 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 111 Topic 12 Discussion

312-50v13 Exam Topic 12 Question 111 Discussion:
Question #: 111
Topic #: 12

As a cybersecurity professional at XYZ Corporation, you are tasked with investigating anomalies in system logs that suggest potential unauthorized activity. System administrators have detected repeated failed login attempts on a critical server, followed by a sudden surge in outbound data traffic. These indicators suggest a possible compromise. Given the sensitive nature of the system and the sophistication of the threat, what should be your initial course of action?


A.

Conduct real-time monitoring of the server, analyze logs for abnormal patterns, and identify the nature of the activity to formulate immediate countermeasures.


B.

Conduct a comprehensive audit of all outbound traffic and analyze destination IP addresses to map the attacker’s network.


C.

Immediately reset all server credentials and instruct all users to change their passwords.


D.

Immediately disconnect the affected server from the network to prevent further data exfiltration.


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.