CompTIA Security+ SY0-601: Determining Active Connections from Compromised Systems

Determining Active Connections from Compromised Systems

Prev Question Next Question

Question

A security analyst is diagnosing an incident in which a system was compromised from an external IP address.

The socket identified on the firewall was traced to 207.46.130.0:6666

Which of the following should the security analyst do to determine if the compromised system still has an active connection?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

The appropriate tool for determining if a compromised system still has an active connection to the external IP address identified by the firewall is netstat.

Netstat (short for network statistics) is a command-line tool used to display active network connections and their status, as well as other network-related information. It provides detailed information about TCP and UDP connections, including the source and destination IP addresses, port numbers, and the status of the connection.

To determine if the compromised system still has an active connection to the external IP address, the security analyst can use the following steps:

  1. Open a command prompt on the compromised system.
  2. Type netstat -an and press enter. This will display a list of all active connections on the system, including those to external IP addresses.
  3. Look for the IP address identified by the firewall (207.46.130.0) and the port number (6666) in the output of the netstat command.
  4. If there is an active connection to this IP address and port number, the security analyst should investigate further to determine the nature of the connection and take appropriate action to terminate it.

In summary, the correct tool for determining if a compromised system still has an active connection to an external IP address is netstat. The security analyst can use the netstat -an command to display active network connections and look for the IP address and port number identified by the firewall.