Bird
0
0

An organization wants to detect APT activity by analyzing network logs. Which combination of indicators would best suggest an ongoing APT?

hard🚀 Application Q8 of 15
Cybersecurity - Advanced Threat Protection
An organization wants to detect APT activity by analyzing network logs. Which combination of indicators would best suggest an ongoing APT?
AUnusual outbound encrypted traffic, repeated login attempts, and connections to rare domains
BHigh volume of incoming spam emails and frequent password resets
CMultiple users downloading large files from internal servers
DRegular software updates and scheduled backups
Step-by-Step Solution
Solution:
  1. Step 1: Identify typical APT network indicators

    APTs often show encrypted outbound data, brute force login attempts, and contact with suspicious domains.
  2. Step 2: Exclude normal or unrelated activities

    Spam, password resets, or normal backups do not indicate APT presence.
  3. Final Answer:

    Unusual outbound encrypted traffic, repeated login attempts, and connections to rare domains -> Option A
  4. Quick Check:

    APT detection = Encrypted traffic + login attempts + rare domains [OK]
Quick Trick: Look for encrypted traffic plus suspicious logins and domains [OK]
Common Mistakes:
MISTAKES
  • Confusing spam or backups with APT signs
  • Ignoring login attempts as irrelevant
  • Assuming large downloads always mean attack

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Cybersecurity Quizzes