What are two important reasons why the SOC analysts should not quickly formulate a conclusion that identifies the threat actor of the attack, based on a single IDS alert? (Choose two.)
- The alert maybe a true positive alert.
- A single alert usually can not provide enough conclusive evidence, and should be correlated with other event data.
- If the threat actor is using a backdoor remote access trojan to access the compromised host, then the resulting alert may contain false source and destination IP address information.
- The threat actor may be pivoting through another compromised device to obscure their true identity and location
Explanation & Hint:
Two important reasons why SOC (Security Operations Center) analysts should not quickly formulate a conclusion that identifies the threat actor of an attack based on a single IDS (Intrusion Detection System) alert are:
The other options, while important considerations in security analysis, are not as directly relevant to the caution against premature attribution based on a single alert:
|