Question 5 of 10Pro Only
How would you detect unauthorized access attempts in network logs, and what specific patterns would indicate a potential security breach requiring immediate escalation?
Sample answer preview
Detecting unauthorized access requires correlation of multiple log sources and recognition of suspicious patterns that deviate from normal user behavior. Start by monitoring authentication logs for failed login attempts, particularly focusing on account lockout events, repeated…
failed-loginstemporal-anomaliesprivilege-escalationlateral-movementdata-exfiltrationimmediate-escalation