Which logs would MOST likely indicate the original source of malware following an infection on a host system?

Prepare for the CompTIA Security+ SY0-601 exam. Explore comprehensive flashcards and diverse multiple-choice questions with hints and explanations. Get exam-ready now!

DNS logs are crucial in identifying the original source of malware following an infection on a host system because they record all domain name resolution requests made by the system. When malware infects a host, it often attempts to connect to a command and control server or downloads additional malicious payloads from the internet. These activities will typically involve DNS queries, which serve to resolve domain names associated with the malware’s operation.

By analyzing the DNS logs, security professionals can trace which domains were contacted at the time of the infection, potentially revealing the source of the malware. This information is vital for understanding the nature of the attack, facilitating incident response, and preventing future infections.

In contrast, web server logs primarily focus on requests made to a web server itself, which may not directly indicate where the malware originated from on the infected host. SIP traffic logs are related to session initiation protocols, mainly used for managing voice or video communication, and do not pertain to malware activity. SNMP logs deal with network management and monitoring traffic, which is less relevant for tracing the origin of a malware infection.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy