100% Free Exams (No login or credit card required)

Section 4.9

Demonstrate your acquired knowledge about data sources to support an investigation. This will demonstrate your proficiency for section 4.9 of the Security+ SY0-701 objectives.

1 / 25

Why might packet captures be considered sensitive in a forensic context?

2 / 25

How can vulnerability scans assist a threat investigation?

3 / 25

Which log source would show blocked communication attempts?

4 / 25

Which of the following would best identify excessive login failures across systems?

5 / 25

What would you expect to see in metadata during an investigation?

6 / 25

In which log would a port scanning attempt most likely be recorded?

7 / 25

Which data source provides the most detailed protocol-level insight?

8 / 25

What does a spike in outbound traffic on network logs most likely indicate?

9 / 25

Which log best supports detection of fileless malware?

10 / 25

Which data source helps in verifying whether a vulnerability has been patched?

11 / 25

Where would a system administrator most likely find signs of privilege escalation?

12 / 25

Why are endpoint logs critical during malware analysis?

13 / 25

Which log is most valuable for correlating security events across multiple systems?

14 / 25

Which log type would reveal communication between a compromised host and a command server?

15 / 25

What type of data does a packet capture typically include?

16 / 25

Which log source is most likely to detect a brute-force password attack?

17 / 25

How can dashboards assist an analyst during an investigation?

18 / 25

Where would failed authentication attempts most likely appear?

19 / 25

Which log would most likely show a SQL injection attempt?

20 / 25

Which source is best for identifying vulnerabilities before they are exploited?

21 / 25

Why are automated reports beneficial in incident response?

22 / 25

Which log source would most likely reveal unauthorized registry edits on a workstation?

23 / 25

What type of data can packet captures provide that logs typically cannot?

24 / 25

What information is most commonly found in firewall logs?

25 / 25

Which log type is best suited for identifying lateral movement across hosts?

Your score is

The average score is 0%

0%