Bird
0
0

You want to investigate a suspected data breach by analyzing network traffic logs. Which combination of actions best applies network forensics principles?

hard🚀 Application Q15 of 15
Cybersecurity - Digital Forensics
You want to investigate a suspected data breach by analyzing network traffic logs. Which combination of actions best applies network forensics principles?
ACapture network packets, analyze logs for unusual activity, and preserve evidence securely
BDelete old logs to free space, restart the network, and notify users
CInstall antivirus software, update passwords, and block all network traffic
DRun a speed test, upgrade hardware, and change Wi-Fi passwords
Step-by-Step Solution
Solution:
  1. Step 1: Identify key network forensics tasks

    Network forensics involves capturing data, analyzing it for threats, and preserving evidence.
  2. Step 2: Evaluate each option's relevance

    Capture network packets, analyze logs for unusual activity, and preserve evidence securely matches these tasks; others focus on unrelated or incorrect actions.
  3. Final Answer:

    Capture network packets, analyze logs for unusual activity, and preserve evidence securely -> Option A
  4. Quick Check:

    Network forensics = Capture + Analyze + Preserve [OK]
Quick Trick: Focus on capture, analyze, and preserve steps [OK]
Common Mistakes:
MISTAKES
  • Confusing network forensics with general IT maintenance
  • Ignoring evidence preservation
  • Choosing unrelated security actions

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Cybersecurity Quizzes