Which of the following is NOT an indicator of compromise according to CompTIA?

Prepare for the WGU ITAS6291 D488 Cybersecurity Architecture and Engineering exam. Use flashcards and multiple-choice questions, each with explanations and guidance. Master your knowledge and excel in your exam!

High call volume is not typically considered an indicator of compromise in cybersecurity contexts as defined by CompTIA. The primary focus of indicators of compromise (IOCs) is on behaviors or events that suggest malicious activity affecting data integrity, confidentiality, or availability.

Odd network traffic, for example, is a significant IOC, as it can indicate unauthorized access, data exfiltration, or other malicious activities. Unauthorized changes in system configurations or files are clear signs of potential breaches or attempts to compromise a system. Geographic anomalies are also critical because they can highlight abnormal access patterns or attempts to breach systems from unusual locations, which would not align with accepted usage patterns.

In contrast, high call volume does not inherently indicate a security breach or compromise. While it could be relevant in specific contexts—such as in assessments of service quality or customer inquiries—it does not directly correlate with the presence of malware, unauthorized access, or data theft. Thus, it does not serve as a reliable indicator within the framework of monitoring for compromised security.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy