To quickly reduce noise when detecting requests to potentially malicious domains from NDR logs, which approach is most appropriate?

Prepare for the Google SecOps Professional Engineer Test with our interactive quiz. Utilize flashcards and multiple-choice questions with hints and explanations to boost your readiness and confidence.

Multiple Choice

To quickly reduce noise when detecting requests to potentially malicious domains from NDR logs, which approach is most appropriate?

Explanation:
Leveraging threat intelligence feeds to filter NDR-detected domain requests is the fastest way to cut noise. By ingesting TIP logs and building a multi-event correlation between each NDR domain request and your threat intel data, you can quickly distinguish known malicious domains from the rest. When a request matches a known indicator, you can elevate or block it; otherwise, it can be deprioritized, dramatically reducing false positives without waiting on slower, more manual checks. Other approaches lack that combined speed and certainty: just ingesting domain-monitoring logs without TI context provides less immediate signal to separate benign from malicious; enriching with VirusTotal and auto-closing benign depends on external checks that can lag and may misclassify edge cases; using WHOIS context and domain creation time adds some value but isn’t timely for current malicious activity and won’t scale as effectively for rapid noise reduction.

Leveraging threat intelligence feeds to filter NDR-detected domain requests is the fastest way to cut noise. By ingesting TIP logs and building a multi-event correlation between each NDR domain request and your threat intel data, you can quickly distinguish known malicious domains from the rest. When a request matches a known indicator, you can elevate or block it; otherwise, it can be deprioritized, dramatically reducing false positives without waiting on slower, more manual checks.

Other approaches lack that combined speed and certainty: just ingesting domain-monitoring logs without TI context provides less immediate signal to separate benign from malicious; enriching with VirusTotal and auto-closing benign depends on external checks that can lag and may misclassify edge cases; using WHOIS context and domain creation time adds some value but isn’t timely for current malicious activity and won’t scale as effectively for rapid noise reduction.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy