exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 203 discussion

Actual exam question from CompTIA's N10-008
Question #: 203
Topic #: 1
[All N10-008 Questions]

A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?

  • A. Syslog server messages
  • B. MIB of the attacked firewall
  • C. Network baseline reports
  • D. NetFlow aggregate data
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
bengy78
Highly Voted 2 years, 2 months ago
Chaning my vote to Netflow as Comptia Security+ says Netflow is often used in compromise investigations.
upvoted 21 times
...
Nishkurup
Highly Voted 2 years, 1 month ago
NetFlow is a tremendous security tool. It provides anomaly detection and investigative capabilities that can be helpful in incident response. The Cisco Cyber Threat Defense (CTD) solution uses NetFlow as the primary security visibility tool. NetFlow plays a crucial role in the preparation and identification phases. Information collected in NetFlow records can be used as part of identifying, categorizing, and scoping suspected incidents as part of the identification. NetFlow data also provides great benefits for attack traceback and attribution. In addition, NetFlow provides visibility into what is getting into your network and what information is being exfiltrated out of your network. https://www.ciscopress.com/articles/article.asp?p=2812391&seqNum=5#:~:text=NetFlow%20is%20a%20tremendous%20security,the%20primary%20security%20visibility%20tool.
upvoted 14 times
...
dvdlau
Most Recent 3 weeks, 5 days ago
Selected Answer: A
Syslog servers collect and store log messages from various network devices, including firewalls, routers, and switches. These logs can provide detailed information about network activities, configuration changes, and security events. Even if the firewall's local logs were wiped, the syslog server would have a record of the events leading up to and during the attack.
upvoted 1 times
...
jcre
4 months, 2 weeks ago
I say the answer is B. MIB of the attacked firewall. MIBs can provide information about a firewall that have been involved in an attack such as configuration changes, status info, automatic alerts to malicious activity, operational info, routing tables, and interface details.
upvoted 1 times
...
daddylonglegs
5 months ago
Selected Answer: A
I'm siding with A on this one. Yes, netflow can be used to gather evidence of an investigation in the event of a breach in terms of sources, destinations, and volume of network traffic. But, to investigate HOW the firewall was initially compromised the messages sent to the syslog server would be more useful, as you would be looking for an exploitation of a vulnerability or misconfiguration, which you will not find by simply looking at traffic patterns. Look at the option D itself, NetFlow AGGREGATE data. Aggregated data will not be helpful in investigating the root cause of the compromise.
upvoted 2 times
...
Chidazz
5 months, 3 weeks ago
NetFlow aggregate data NetFlow aggregate data provides information about network traffic patterns, such as which IP addresses are communicating with each other and the volume of traffic. While it can be useful for identifying unusual traffic patterns or sources of high traffic that might indicate suspicious activity, it generally provides less detail about specific events or changes compared to syslog server messages. So, for detailed data about the firewall's configuration and logs, syslog server messages would still be the most detailed source.
upvoted 3 times
daddylonglegs
5 months ago
This is correct. For everyone who thinks it's D, think about what the question is actually asking. You're looking for the method used to compromise the firewall, which would be an exploitation of a vulnerability or misconfiguration. Yes, netflow can be used to give an indication that there is a security incident if you see unusual traffic to strange destinations. But, simply by looking at aggregated data you will not get very far in investigating how the firewall was compromised
upvoted 1 times
...
...
[Removed]
1 year ago
Selected Answer: D
NetFlow is used in compromise situations.
upvoted 3 times
...
Paula77
1 year ago
Selected Answer: D
NetFlow data provides detailed information about traffic flows on all network segments
upvoted 4 times
...
LennoxX_3
1 year, 1 month ago
Selected Answer: A
A is correct i think, because it is a border firewall, and if it was attacked from outside, NetFlow will not have captured anything of it. The syslog server in the internal network however, will very likely still have the firewall logs.
upvoted 3 times
...
Mehsotopes
1 year, 1 month ago
Selected Answer: D
With NetFlow Data, you can see what type of traffic is consuming all the resources on the network. You can see if it's Facebook, or Twitter. You may not want a lot of your bandwidth being used by people browsing social media, but if you're a social media marketing company, you would expect this. You can also look at the application type that is generating traffic such as Web, NetBIOS, VoIP, ICMP, or even BitTorrents. Understanding the data flow of your network, you can increase your overall performance, or even block traffic types that are not generating any value for your business. A network outage can be caused by overuse from a specific website that is trying to consume way too many resources from your network.
upvoted 2 times
daddylonglegs
5 months ago
This answer is not relevant to the question whatsoever. What was the prompt that you fed ChatGPT?
upvoted 1 times
...
...
phoenix98
1 year, 2 months ago
Selected Answer: D
Netflow collects the data and interprets it. Sys Log gives the severity level of the problem that the Netflow collects.
upvoted 6 times
Mehsotopes
1 year, 1 month ago
This answer is very good, thank you.
upvoted 2 times
...
...
TacosInMyBelly
1 year, 3 months ago
Selected Answer: A
While NetFlow data can be helpful in identifying unusual traffic patterns or a large amount of data leaving the network, it might not offer the level of detail needed to determine how the firewall was compromised. NetFlow data is more focused on network traffic and might not capture the specific events or actions that led to the wiping of the firewall's configuration and logs. In contrast, syslog server messages are specifically designed to capture detailed information about various system events, including security-related incidents. They often provide information about specific activities, errors, warnings, and other events that occur on the network devices, making them a valuable source of information for investigating security incidents and determining the cause of network outages or breaches.
upvoted 2 times
...
mema_07
1 year, 3 months ago
Selected Answer: D
I vote for Netflow as it can show you the unusual/suspicious network behavior that compromises the firewall.
upvoted 2 times
...
MitchF
1 year, 4 months ago
GPT picks (A): "Among the given options, the source that can provide the MOST detailed data in an investigation to determine how the firewall was compromised is (A) Syslog server messages. Syslog is a standard protocol used for collecting and sending log messages from devices on a network. When a network attack occurs, various network devices including firewalls can generate syslog messages that provide details about the attack, the affected systems, the methods used, and potentially other contextual information. Syslog messages can give insights into the sequence of events leading up to the network outage, the nature of the attack, the exploited vulnerabilities, and other related information. Analyzing these messages can help security professionals reconstruct the timeline of the attack and understand how the firewall was compromised. The other options have their own uses, but they may not provide as detailed information for this specific scenario."
upvoted 2 times
...
Juliana1017
1 year, 5 months ago
Selected Answer: A
correct answer is A, because the logs provide the most data
upvoted 2 times
...
konanna
1 year, 10 months ago
Selected Answer: A
A. Syslog server messages would be the best source to provide the most detailed data in an investigation to determine how the firewall was compromised. Syslog server messages can contain a wealth of information related to network activity, including messages related to firewall activity, such as configuration changes and log messages. In this scenario, reviewing the syslog messages from the firewall prior to the attack could provide insight into the attack method and the source of the attack.
upvoted 1 times
...
BeauChateau
1 year, 11 months ago
A. Syslog server messages can provide the MOST detailed data in an investigation to determine how the firewall was compromised. Syslog server messages contain detailed log information such as date and time stamps, source and destination IP addresses, and actions taken by the firewall. This information can be used to identify and track any suspicious or malicious activity on the network, helping to determine how the firewall was compromised. The MIB, network baseline reports, and NetFlow aggregate data may also provide valuable information, but syslog messages are likely to provide the most complete and detailed picture of the attack and its aftermath.
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago