Question 6 of 10Pro Only
You are investigating a potential security incident. Walk through how you would analyze logs from multiple sources to reconstruct an attack timeline. What log sources would you examine and what patterns would you look for?
Sample answer preview
Reconstructing an attack timeline through log analysis requires methodical correlation of events across multiple data sources. Each source provides a partial view of attacker activity, and combining these perspectives reveals the complete narrative of how an attack progressed…
log analysisevent correlationattack timelineauthentication logsnetwork logsendpoint telemetry