hardmultiple choiceObjective-mapped

A security administrator observes that an employee's workstation is sending large amounts of data to an external IP address on TCP port 443. The workstation is not supposed to initiate outbound connections, and there is no business need for it. What is the most likely cause?

Question 1hardmultiple choice
Full question →

A security administrator observes that an employee's workstation is sending large amounts of data to an external IP address on TCP port 443. The workstation is not supposed to initiate outbound connections, and there is no business need for it. What is the most likely cause?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

The workstation is part of a botnet and is communicating with a command-and-control server

Botnets commonly use HTTPS to blend in with normal encrypted web traffic. The large data volume and lack of business need make this the most likely explanation.

B

Distractor review

A legitimate software update is being downloaded

Software updates typically originate from the workstation contacting update servers, but the description says the workstation should not initiate outbound connections. Also, updates usually have a well-known pattern, and the data is 'sent' (upload) rather than downloaded.

C

Distractor review

The workstation is acting as a VPN client connecting to a corporate VPN server

A VPN client would connect to an internal or known corporate server, not an arbitrary external IP, and traffic would be expected. The scenario suggests no business need, so VPN is unlikely.

D

Distractor review

The workstation is hosting a web server that is being accessed externally

If the workstation were a web server, inbound connections would be expected, but the administrator observed outbound connections from the workstation. Also, the workstation is not supposed to serve content.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related N10-009 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

Question 1

A network engineer needs to connect two switches located 400 meters apart. The cable run includes high electromagnetic interference from nearby machinery. The engineer decides to use fiber optic cabling. Which transceiver type and fiber combination should be used to ensure the link reaches 400 meters while remaining cost-effective?

Question 2

A network engineer is designing a new switched network and needs to ensure that broadcast traffic from one department does not reach another department's workstations. The engineer plans to use VLANs. Which of the following must be configured on the switches to isolate broadcast domains as intended?

Question 3

A security engineer is configuring a site-to-site VPN between two branch offices. The requirement is to encrypt all traffic between the two networks using IPsec. Which IPsec mode should be used to encrypt the entire IP packet including the original header?

Question 4

A network administrator is connecting two switches to increase bandwidth and provide redundancy. Which technology should be used to combine multiple physical links into a single logical link?

Question 5

A network administrator is experiencing issues where unauthorized devices are offering IP addresses to clients, causing connectivity problems. Which security feature should be enabled on switches to prevent this?

Question 6

A network administrator is troubleshooting a connectivity issue and suspects the problem is related to the physical cabling. At which layer of the OSI model should the administrator begin their investigation?

FAQ

Questions learners often ask

What does this N10-009 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: The workstation is part of a botnet and is communicating with a command-and-control server — Unusual outbound traffic on port 443 (HTTPS) from a workstation that should not be making any outbound connections is a strong indicator of a compromised machine that is part of a botnet. Botnets often use encrypted HTTP connections (HTTPS) to communicate with command-and-control servers to evade detection. The large data volume suggests data exfiltration or C2 activity.

What should I do if I get this N10-009 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.