CISSP Exam QuestionsBrowse all questions from this exam

CISSP Exam - Question 407


Which type of log collection is focused on detecting and responding to attacks, malware infection, and data theft?

Show Answer
Correct Answer: C

Security log collection focuses on detecting and responding to attacks, malware infection, and data theft by monitoring and analyzing various system and application logs. This type of log collection is critical for identifying security-related events such as unauthorized access, system changes, and malicious network activity. Intrusion detection focuses specifically on unauthorized access but is a narrower concept, while operational and compliance logs serve different purposes related to IT performance and regulatory requirements.

Discussion

17 comments
Sign in to comment
GPrepOption: A
Jan 5, 2024

I'm going with A. Security logs are just that, logs, they won't react in any way. While IPS is a better solution on the network, IDS CAN respond - see pg 414 of the CISSP Study guide - "Until your browser and/or host-based intrusion detection system (HIDS) can detect and respond to push lockers, the only response is to close/terminate the browser and not return to the same URL. Host-based CAN respond in some way.

liledagOption: C
Mar 16, 2023

The type of log collection that is focused on detecting and responding to attacks, malware infection, and data theft is Security log collection. Therefore, option C, Security, is the correct answer. Intrusion detection log collection is a type of security log collection that focuses specifically on detecting and preventing unauthorized access to a network or system. Operational log collection, on the other hand, is focused on monitoring the performance and availability of IT infrastructure, such as servers, applications, and network devices. Compliance log collection involves collecting and retaining logs to meet regulatory requirements and industry standards, such as PCI DSS, HIPAA, and GDPR. While all three types of log collection are important, security log collection is the most critical for detecting and responding to security incidents and threats.

babaseunOption: C
Apr 19, 2023

How will Intrusion detection detect data theft?

jackdryan
May 14, 2023

C is correct

pete79Option: C
Feb 10, 2024

C contains A

BodatiousbobOption: A
Mar 6, 2023

I agree with A, IDS can detect and respond to all those provided scenarios. While they cannot "prevent", they can still inform/respond by sending alerts. Page 820 of the CISSP 9th edition official study guide.

sausagemanOption: A
Mar 19, 2023

Definitely A. https://resources.infosecinstitute.com/certification/logging-monitoring-need-know-cissp/#:~:text=An%20overview%20of%20log%20file&text=Some%20popular%20examples%20of%20log,prevention%20system%20(IPS)%20logs.

Delab202Option: C
Apr 2, 2023

Security log collection is focused on detecting and responding to attacks, malware infection, and data theft. Security log collection involves the monitoring and analysis of various system and application logs to identify security-related events, such as failed login attempts, changes to system configurations, and network activity. This type of log collection is critical for identifying and responding to security incidents, such as cyber attacks, malware infections, and data theft.

GoseuOption: C
Apr 2, 2023

The type of log collection that is focused on detecting and responding to attacks, malware infection, and data theft is Security log collection. ChatGPT

[Removed]Option: C
Apr 5, 2023

I would go for C here. I think IDS logs are too narrow of a concept for data theft and malware. Security seems a broader concept that covers it all.

YesPleaseOption: A
Dec 23, 2023

Answer A) IDS Keywords in question, "detecting and responding". Only IDS can do this from the list provided.

gjimenezfOption: A
Feb 2, 2024

IDS is the best, Security is limited

GuardianAngelOption: C
Feb 9, 2024

SOAR collects security logs and can respond and "security logs" can include system, security, router, firewall, EDR and other logs. I would say C. Security logs is correct. ID can be either just detection or it can be detection and response, but it doesn't cover malware infection, and data theft as well as a SOAR can.

GeenHersensOption: A
Feb 24, 2024

Answer C is too broad. The question contains "focused" and IDS detects and responds to "attacks, malware infection, and data theft".

hoho2000Option: D
Mar 13, 2024

Should be D. IDS dont response to attack short of issuing an alert or email. In this context I would say the question is asking for stopping the attack since they added in malwares etc words

CCNPWILLOption: A
Jun 2, 2024

Language keywords suggest answer is A and not C. but sure C can, it is a broad answer. answer broadly or answer what is asked? I will go with A.

safriOption: C
Jun 9, 2024

I would go with D because of data theft. The threat can already be inside your network and would not be detected in intrusion detection. Also security is broader

ChrisOption: C
Jul 7, 2024

The CISSP Official Study Guide states that security logs are specifically used to record access to resources and can help detect malicious activities such as unauthorized access and data theft. These logs are essential for identifying and responding to security incidents​​. Therefore, the correct answer is: C. Security This information is found on pages 835-836 of the study guide​