What are some common indicators of compromise (IoCs) in cybersecurity?

Study for the IBM Security Analyst Exam. Prepare with flashcards and multiple choice questions, each question has hints and explanations. Get ready for your exam success!

Unusual outbound network traffic is a significant indicator of compromise (IoC) in cybersecurity because it can signify malicious activity such as data exfiltration or communication with command-and-control servers. When a device within a network is compromised by malware or an attacker, it might begin to send data to external locations, which could be abnormal behavior compared to its regular network activity. This unexpected pattern can alert security analysts to potential breaches or ongoing infiltration attempts, prompting further investigation or response measures.

The other options, while they may be relevant to general security practices or organizational health, do not serve as direct indicators of compromise. Frequent software updates are a standard maintenance practice meant to improve security and performance. Regular employee performance reviews relate to human resources and do not indicate security risks. Increased physical security measures might suggest a heightened awareness of external threats but do not specifically indicate a compromised system.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy