Which technique would best help Jim identify compromised systems in a botnet?

Master CISSP Domain 3 with our expert-designed quiz! Dive into risk identification, monitoring, and analysis with hints and detailed explanations. Prepare effectively for your exam!

To effectively identify compromised systems within a botnet, analyzing NetFlow records can be particularly beneficial. NetFlow records provide detailed information about network traffic, including source and destination IP addresses, ports, and the volume of data transferred. By examining this data, Jim can identify unusual traffic patterns or spikes that may indicate the presence of compromised systems communicating with a command-and-control (C2) server, which is a common behavior in botnets.

Anomalies in traffic, such as unexpected outbound connections, can reveal systems that are infected and participating in malicious activities. For instance, if a host typically generates minimal outbound traffic and suddenly starts sending large volumes of data to unfamiliar external IP addresses, this could suggest a compromised system. This granular visibility into traffic flows is vital for detecting botnet activity.

While other logs such as IDS logs, authentication logs, and RFC logs can provide valuable security insights, they have limitations. IDS logs primarily focus on identifying suspicious activities based on known signatures of threats, but they may not cover all botnet behaviors, especially if the botnet is using encryption or obfuscation techniques. Authentication logs track user access events, which, while informative, do not directly relate to identifying systems participating in a botnet. RFC logs pertain to

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy