Which of the following data sources could provide indication of a system compromise involving the exfiltration of data to an unauthorized destination?
Which of the following data sources could provide indication of a system compromise involving the exfiltration of data to an unauthorized destination?
B. DNS logs Explanation: DNS logs can provide indications of data exfiltration by showing suspicious DNS queries or unusual domain name resolutions that may point to unauthorized destinations. Attackers often use DNS tunneling or unusual domain lookups to exfiltrate data covertly, making DNS logs a valuable source for detecting such activity.