SlideShare a Scribd company logo
1 of 1
Download to read offline
Monitoring Outputs - The primary response includes all three parts
Part 1: What technology or technologies could you use to log internet endpoints and bandwidth
consumption between clients and servers on a local network? What would you do if you did not
have the resources to capture and store all network packets?
Part 2: You are investigating a data exfiltration event and have obtained the web server logs of
the host that data was exported to over the Internet from the hosting provider. The logs contain
only the external IP address of your company's router/firewall and a high-level TCP port number.
How can you use the log to identify the local host on your network that was used to perform the
exfiltration?
Part 3: Go to the Search bar at the left bottom corner of your computer. Type in Event Viewer
(Local). Click on the app provided in the search. Open the Event Viewer and expand the
Windows Logs section. Review the application and Security event logs. What do you notice?
Share in the discussion post what you located and why it is important to review those specific
logs on a regular basis.

More Related Content

Similar to Monitoring Outputs - The primary response includes all three parts.pdf

Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisGTKlondike
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
unit 2 -program security.pdf
unit 2 -program security.pdfunit 2 -program security.pdf
unit 2 -program security.pdfKavithaK23
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3Education
 
Pmw2 k3ni 1-1b
Pmw2 k3ni 1-1bPmw2 k3ni 1-1b
Pmw2 k3ni 1-1bhariclant1
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
Big Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkBig Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkIJERA Editor
 
Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Travis
 
First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]Phil Huggins FBCS CITP
 
Machine Problem 1: Let's chat
Machine Problem 1: Let's chatMachine Problem 1: Let's chat
Machine Problem 1: Let's chatbutest
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpOlli-Pekka Niemi
 
Agata overview
Agata overviewAgata overview
Agata overviewUdi Levin
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET Journal
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers carlosrudy_45
 

Similar to Monitoring Outputs - The primary response includes all three parts.pdf (20)

Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
unit 2 -program security.pdf
unit 2 -program security.pdfunit 2 -program security.pdf
unit 2 -program security.pdf
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Pmw2 k3ni 1-1b
Pmw2 k3ni 1-1bPmw2 k3ni 1-1b
Pmw2 k3ni 1-1b
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Big Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkBig Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using Splunk
 
Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.
 
First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]
 
Machine Problem 1: Let's chat
Machine Problem 1: Let's chatMachine Problem 1: Let's chat
Machine Problem 1: Let's chat
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
Protocol & Type of Networks
Protocol & Type of NetworksProtocol & Type of Networks
Protocol & Type of Networks
 
Agata overview
Agata overviewAgata overview
Agata overview
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers
 
nonprof2007.ppt
nonprof2007.pptnonprof2007.ppt
nonprof2007.ppt
 
DCA White Paper
DCA White PaperDCA White Paper
DCA White Paper
 

More from freddysarabia1

Labprogram.javaLinkedList.javaimport java.util.NoSuchElementEx.pdf
Labprogram.javaLinkedList.javaimport java.util.NoSuchElementEx.pdfLabprogram.javaLinkedList.javaimport java.util.NoSuchElementEx.pdf
Labprogram.javaLinkedList.javaimport java.util.NoSuchElementEx.pdffreddysarabia1
 
In your application you choose your own Entity class - pick somethin.pdf
In your application you choose your own Entity class - pick somethin.pdfIn your application you choose your own Entity class - pick somethin.pdf
In your application you choose your own Entity class - pick somethin.pdffreddysarabia1
 
operate a standardized, government-wide emergency medical service. Sit.pdf
operate a standardized, government-wide emergency medical service. Sit.pdfoperate a standardized, government-wide emergency medical service. Sit.pdf
operate a standardized, government-wide emergency medical service. Sit.pdffreddysarabia1
 
Oakdale County School Busing The Oakdale County School Board was meeti.pdf
Oakdale County School Busing The Oakdale County School Board was meeti.pdfOakdale County School Busing The Oakdale County School Board was meeti.pdf
Oakdale County School Busing The Oakdale County School Board was meeti.pdffreddysarabia1
 
Nina is the head of IT at a multinational company. She is promoting .pdf
Nina is the head of IT at a multinational company. She is promoting .pdfNina is the head of IT at a multinational company. She is promoting .pdf
Nina is the head of IT at a multinational company. She is promoting .pdffreddysarabia1
 
Mr. D.I.Y. Group (M) Berhads (Mr. D.I.Y.) annual report for the fis.pdf
Mr. D.I.Y. Group (M) Berhads (Mr. D.I.Y.) annual report for the fis.pdfMr. D.I.Y. Group (M) Berhads (Mr. D.I.Y.) annual report for the fis.pdf
Mr. D.I.Y. Group (M) Berhads (Mr. D.I.Y.) annual report for the fis.pdffreddysarabia1
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
 
MGT4209 Applied Project Management Project Charter � Celebration of Cu.pdf
MGT4209 Applied Project Management Project Charter � Celebration of Cu.pdfMGT4209 Applied Project Management Project Charter � Celebration of Cu.pdf
MGT4209 Applied Project Management Project Charter � Celebration of Cu.pdffreddysarabia1
 
Modify the program written for the pay with overtime paid at time an.pdf
Modify the program written for the pay with overtime paid at time an.pdfModify the program written for the pay with overtime paid at time an.pdf
Modify the program written for the pay with overtime paid at time an.pdffreddysarabia1
 
Maryam Blume decided to serve the children she was babysitting, ages.pdf
Maryam Blume decided to serve the children she was babysitting, ages.pdfMaryam Blume decided to serve the children she was babysitting, ages.pdf
Maryam Blume decided to serve the children she was babysitting, ages.pdffreddysarabia1
 
Interpreting Visual Culture Assignment Choose one of the followin.pdf
Interpreting Visual Culture Assignment  Choose one of the followin.pdfInterpreting Visual Culture Assignment  Choose one of the followin.pdf
Interpreting Visual Culture Assignment Choose one of the followin.pdffreddysarabia1
 
Kwame works for the Central Bank of Kenya and is attempting to forec.pdf
Kwame works for the Central Bank of Kenya and is attempting to forec.pdfKwame works for the Central Bank of Kenya and is attempting to forec.pdf
Kwame works for the Central Bank of Kenya and is attempting to forec.pdffreddysarabia1
 

More from freddysarabia1 (12)

Labprogram.javaLinkedList.javaimport java.util.NoSuchElementEx.pdf
Labprogram.javaLinkedList.javaimport java.util.NoSuchElementEx.pdfLabprogram.javaLinkedList.javaimport java.util.NoSuchElementEx.pdf
Labprogram.javaLinkedList.javaimport java.util.NoSuchElementEx.pdf
 
In your application you choose your own Entity class - pick somethin.pdf
In your application you choose your own Entity class - pick somethin.pdfIn your application you choose your own Entity class - pick somethin.pdf
In your application you choose your own Entity class - pick somethin.pdf
 
operate a standardized, government-wide emergency medical service. Sit.pdf
operate a standardized, government-wide emergency medical service. Sit.pdfoperate a standardized, government-wide emergency medical service. Sit.pdf
operate a standardized, government-wide emergency medical service. Sit.pdf
 
Oakdale County School Busing The Oakdale County School Board was meeti.pdf
Oakdale County School Busing The Oakdale County School Board was meeti.pdfOakdale County School Busing The Oakdale County School Board was meeti.pdf
Oakdale County School Busing The Oakdale County School Board was meeti.pdf
 
Nina is the head of IT at a multinational company. She is promoting .pdf
Nina is the head of IT at a multinational company. She is promoting .pdfNina is the head of IT at a multinational company. She is promoting .pdf
Nina is the head of IT at a multinational company. She is promoting .pdf
 
Mr. D.I.Y. Group (M) Berhads (Mr. D.I.Y.) annual report for the fis.pdf
Mr. D.I.Y. Group (M) Berhads (Mr. D.I.Y.) annual report for the fis.pdfMr. D.I.Y. Group (M) Berhads (Mr. D.I.Y.) annual report for the fis.pdf
Mr. D.I.Y. Group (M) Berhads (Mr. D.I.Y.) annual report for the fis.pdf
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
 
MGT4209 Applied Project Management Project Charter � Celebration of Cu.pdf
MGT4209 Applied Project Management Project Charter � Celebration of Cu.pdfMGT4209 Applied Project Management Project Charter � Celebration of Cu.pdf
MGT4209 Applied Project Management Project Charter � Celebration of Cu.pdf
 
Modify the program written for the pay with overtime paid at time an.pdf
Modify the program written for the pay with overtime paid at time an.pdfModify the program written for the pay with overtime paid at time an.pdf
Modify the program written for the pay with overtime paid at time an.pdf
 
Maryam Blume decided to serve the children she was babysitting, ages.pdf
Maryam Blume decided to serve the children she was babysitting, ages.pdfMaryam Blume decided to serve the children she was babysitting, ages.pdf
Maryam Blume decided to serve the children she was babysitting, ages.pdf
 
Interpreting Visual Culture Assignment Choose one of the followin.pdf
Interpreting Visual Culture Assignment  Choose one of the followin.pdfInterpreting Visual Culture Assignment  Choose one of the followin.pdf
Interpreting Visual Culture Assignment Choose one of the followin.pdf
 
Kwame works for the Central Bank of Kenya and is attempting to forec.pdf
Kwame works for the Central Bank of Kenya and is attempting to forec.pdfKwame works for the Central Bank of Kenya and is attempting to forec.pdf
Kwame works for the Central Bank of Kenya and is attempting to forec.pdf
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Monitoring Outputs - The primary response includes all three parts.pdf

  • 1. Monitoring Outputs - The primary response includes all three parts Part 1: What technology or technologies could you use to log internet endpoints and bandwidth consumption between clients and servers on a local network? What would you do if you did not have the resources to capture and store all network packets? Part 2: You are investigating a data exfiltration event and have obtained the web server logs of the host that data was exported to over the Internet from the hosting provider. The logs contain only the external IP address of your company's router/firewall and a high-level TCP port number. How can you use the log to identify the local host on your network that was used to perform the exfiltration? Part 3: Go to the Search bar at the left bottom corner of your computer. Type in Event Viewer (Local). Click on the app provided in the search. Open the Event Viewer and expand the Windows Logs section. Review the application and Security event logs. What do you notice? Share in the discussion post what you located and why it is important to review those specific logs on a regular basis.