Exam PCCET All QuestionsBrowse all questions from this exam
Question 101

What should a security operations engineer de when reviewing suspicious, but successful, login activity?

    Correct Answer: B

    When reviewing suspicious, but successful, login activity, the immediate priority should be to look for other types of suspicious activity in the moments before or after the login. This helps to identify any patterns or additional indicators of compromise, such as unusual file access or changes in user behavior, which could provide more context around the suspicious login and assist in determining the appropriate next steps. Disabling the user account immediately, inspecting network firewalls, or reviewing all active accounts might be steps taken later based on findings from the initial review of surrounding activities.

Discussion
mkucuk89Option: B

B. Look for other types of suspicious activity in the moments before or after the login.