exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 11 discussion

Actual exam question from CompTIA's CS0-003
Question #: 11
Topic #: 1
[All CS0-003 Questions]

An incident response team receives an alert to start an investigation of an internet outage. The outage is preventing all users in multiple locations from accessing external SaaS resources. The team determines the organization was impacted by a DDoS attack. Which of the following logs should the team review first?

  • A. CDN
  • B. Vulnerability scanner
  • C. DNS
  • D. Web server
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
nmap_king_22
Highly Voted 1 year, 7 months ago
Selected Answer: C
In the case of an internet outage caused by a Distributed Denial of Service (DDoS) attack that is preventing users from accessing external SaaS resources, the incident response team should review the DNS (Domain Name System) logs first. C. DNS Explanation: DNS Logs: DDoS attacks often involve overwhelming the DNS infrastructure to disrupt normal internet services. By reviewing DNS logs, the incident response team can identify abnormal traffic patterns, unusual queries, and potential signs of a DDoS attack targeting the organization's DNS servers. Analyzing DNS logs can help pinpoint the attack source, the type of attack, and the affected domains.
upvoted 14 times
...
VVV4WIN
Highly Voted 1 year, 4 months ago
Selected Answer: C
Really tricky one, think it just clicked for me. Let me explain how I see it. Problem is with external SaaS resources (example O365) that your users cannot access from anywhere in the world (multiple locations). The organization affected was not your own, but Microsoft in this example. It will not be your Web Server, CDN or Vulnerability scanner that will show anything as this was not on your network and you were not the target. Then also take not that many DDoS attacks bring targets down by stopping DNS replication of their services. Your DNS servers will thus show they were not able to find any related DNS records for the O365 resources and thus not able to provide any DNS query responses to the client devices. (This all after the DNS record TTL expired and the records needed to be updated). So in my opinion, DNS is the only place that will reflect any of this.
upvoted 7 times
mzajy
1 year, 3 months ago
users from multiple places cannot reach (((external))) SaaS resource. so in your example, if my employees cant reach O365, how does it relate to my DNS (and not Microsoft's DNS)?
upvoted 2 times
...
...
newenglandgirl1078
Most Recent 3 days, 4 hours ago
Selected Answer: C
C. DNS is often targeted in DDOS attacks.
upvoted 1 times
...
joshua08
7 months, 3 weeks ago
DNS does not use CDN, CDN uses DNS. Thus, DNS is the most correct answer.
upvoted 1 times
...
boog
11 months, 2 weeks ago
Nothing in the question says the type of ddos. Go to the source of the outage first, Web server logs. Then work backwards towards the users.
upvoted 1 times
...
sirquinton95
1 year, 1 month ago
Selected Answer: C
DDoS attacks target the Domain Name System infrastructure
upvoted 2 times
...
Mountain_Man_Yuppie
1 year, 3 months ago
Lots of people giving compelling reasons for CDN here. I'd like to make the caveat that nowhere in the CompTIA CySA+ book is CDN ever mentioned so it's most likely DNS.
upvoted 2 times
...
WaaHassan
1 year, 3 months ago
Selected Answer: C
If I set all the devices on my network to use my internal DNS server, I will be able to access my local resources by name, as well as the internet. However, if my internal DNS server goes down (Dd DDos attack), my devices will not be able to resolve any domain names, neither local nor external. This means that I will not be able to access any websites or services by name, only by IP address.
upvoted 3 times
...
RobV
1 year, 4 months ago
Selected Answer: A
A: CDN Reviewing DNS (Domain Name System) logs is indeed an important aspect of investigating a DDoS attack, but in the context of an internet outage affecting the ability to access external SaaS resources, CDN logs would typically be more directly relevant. While DNS logs are important, CDN logs are likely to provide more directly relevant information about the ongoing DDoS attack and its impact on accessing external SaaS resources during an internet outage.
upvoted 1 times
...
greatsparta
1 year, 5 months ago
Selected Answer: C
CDN (Content Delivery Network) logs may also be useful in understanding traffic patterns, but DNS logs are generally more directly relevant in the early stages of investigating a DDoS attack.
upvoted 1 times
...
Sharecyber
1 year, 5 months ago
Selected Answer: C
Most DDoS attacks are in DNS logs
upvoted 3 times
...
chaddman
1 year, 5 months ago
Selected Answer: A
A. CDN (Content Delivery Network): CDNs are often used to mitigate the effects of DDoS attacks by distributing traffic across multiple servers. CDN logs can provide immediate insights into the nature and scale of the attack, including source IP addresses, types of requests, and geographic origins.
upvoted 3 times
...
eacunha
1 year, 7 months ago
Selected Answer: C
3. **Verificador de Vulnerabilidade e Servidor Web**: Embora esses elementos sejam importantes em uma investigação de incidente de segurança, eles normalmente não fornecerão informações imediatas sobre um ataque DDoS em andamento. O verificador de vulnerabilidades e o servidor web podem ser relevantes para determinar se o ataque DDoS causou outras vulnerabilidades ou danos, mas não são a primeira linha de investigação para identificar e mitigar um ataque DDoS. Portanto, a revisão dos registros DNS é a melhor opção inicial para entender e lidar com um ataque DDoS que está afetando o acesso aos recursos SaaS externos da organização.
upvoted 2 times
...
attesco
1 year, 8 months ago
Selected Answer: D
Web server is the answer. What is DNS have to do with it, afterall--------we are not querying IP address or translating
upvoted 3 times
Uncle_Lucifer
1 year, 7 months ago
DNS is valid mate. Google how to mitigate DDOS you will see - Mitigate DNS DDoS
upvoted 2 times
...
Uncle_Lucifer
1 year, 7 months ago
A DDoS attack is a type of attack that floods a target with more traffic than it can handle. This can cause the target to become unavailable to legitimate users. The DNS logs will show the IP addresses of the devices that were sending the traffic to the target. This information can be used to identify the attackers. The other logs may also be helpful in investigating a DDoS attack, but they are less likely to provide the same level of detail as the DNS logs.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago