After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should the network security manager consult FIRST to determine a priority list for forensic review?
A) The vulnerability scan output
B) The IDS logs
C) The full packet capture data
D) The SIEM alerts
Correct Answer:
Verified
Q80: Which of the following is a team
Q81: A pharmaceutical sales representative logs on to
Q82: A security analyst receives a SIEM alert
Q83: Phishing and spear-phishing attacks have been occurring
Q84: The process of passively gathering information prior
Q86: An organization has various applications that contain
Q87: A user reports constant lag and performance
Q88: A startup company is using multiple SaaS
Q89: Users at an organization have been installing
Q90: On which of the following is the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents