Question 4 of 10Pro Only
Describe how you would use SIEM search queries to investigate a suspected brute-force attack. What fields would you search for, and what patterns would you look for?
Sample answer preview
Investigating a suspected brute-force attack through SIEM queries involves a systematic approach where I progressively narrow down the data to confirm or deny the attack and understand its scope.
SIEM queriesbrute-force detectionEvent ID 4625Event ID 4624credential stuffingaccount lockout