When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

Drag and Drop
A security analyst suspects that a workstation may be beaconing to a command and control server. You must inspect the logs from the company’s web proxy server and the firewall to determine the best course of action to take in order to neutralize the threat with minimum impact to the organization.
Instructions:
If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.



A. Answer below

CS0-002: CompTIA CySA+ Exam

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

6 thoughts on “When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

  1. The reason you are blocking 1.5 is that the question asks about beaconing, because of bqtest.ru is showing clear signs of beaconing appering every several minutes in the log.

  2. Can someone please explain why X.5 would be the one to block going out to erdas.com. Is it because its the only one going out of port 8080?
    Why not block ip X.6 going out to malware.com?

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.