Chapter 11 ■ Practice Test 3 277
A. Too much log data will be stored on the system.
B. The system is automatically purging archived logs.
C. The logs will not contain the information needed.
D. The logs will only contain the most recent 20 MB of log data.
- While investigating a widespread distributed denial of service attack, Matt types in the IP
address of one of the attacking systems into his browser and sees the following page. What
type of devices is the botnet likely composed of?
A. SCADA
B. Cloud infrastructure
C. Web servers
D. IoT
For questions 85–87, please refer to the following scenario:
Alejandro is an incident response analyst for a large corporation. He is on the midnight
shift when an intrusion detection system alerts him to a potential brute-force password
attack against one of the company’s critical information systems. He performs an initial
triage of the event before taking any additional action.