Other: vulnerability scans, automated reports, dashboards, packet captures

4.7 Data sources for investigation

📘CompTIA Security+ (SY0-701)


When investigating security incidents or monitoring systems, there are some additional tools and data sources beyond standard logs. These help IT teams detect vulnerabilities, track activity, and understand network traffic. These include vulnerability scans, automated reports, dashboards, and packet captures.


1. Vulnerability Scans

What it is:
A vulnerability scan is an automated check of systems (like servers, computers, or network devices) to find weaknesses that hackers could exploit.

Key points to remember for the exam:

  • Vulnerability scans do not exploit the weaknesses; they just report them.
  • They are often run regularly to find issues before attackers do.
  • Scans can be internal (checking your own network) or external (checking what an attacker might see from the internet).

How it’s used in an IT environment:

  • A scan might detect missing security patches on a server.
  • Alerts IT staff to weak passwords or outdated software.
  • Helps prioritize which vulnerabilities need fixing first.

Example (IT context, not real-world analogy):

A company runs a vulnerability scan on their web server and finds that an outdated version of software is installed that could allow remote access. IT fixes it immediately.


2. Automated Reports

What it is:
Automated reports are summaries of data collected from IT systems, security tools, or logs. These reports are generated automatically at set intervals.

Key points for the exam:

  • Saves time: IT doesn’t have to manually check logs or data.
  • Can be customized to include specific types of incidents, devices, or time periods.
  • Helps track trends, like increase in failed logins or unusual network activity.

How it’s used in IT:

  • A report could show how many login failures occurred in the past week.
  • Security teams can see which devices are most targeted by malware.
  • Helps management understand security posture without reading raw logs.

3. Dashboards

What it is:
A dashboard is a visual display of security data, often in real time. Think of it as a control panel showing graphs, charts, and alerts.

Key points for the exam:

  • Dashboards help analysts see patterns quickly.
  • Commonly used in Security Information and Event Management (SIEM) systems.
  • Can show live attacks, system health, or threat levels.

How it’s used in IT:

  • A network dashboard might show which devices are consuming the most bandwidth.
  • A security dashboard could highlight devices with the most detected threats.
  • Allows IT to react quickly to unusual activity.

4. Packet Captures (PCAP)

What it is:
Packet capture is a way to record network traffic moving through a network. Every small piece of data that goes between devices (like emails, logins, or file transfers) is called a packet.

Key points for the exam:

  • Used to analyze traffic and troubleshoot network or security issues.
  • Can detect malware, unauthorized access, or data exfiltration.
  • Requires tools like Wireshark to view and analyze captured packets.

How it’s used in IT:

  • If a server is behaving oddly, IT can capture packets to see which computers are communicating with it.
  • Can identify malicious traffic, like repeated failed login attempts from a suspicious IP.
  • Helps verify that security controls are working correctly, e.g., firewall rules blocking traffic.

Summary Table for Exam

Data SourcePurpose / UseKey Points for Exam
Vulnerability ScansDetect weaknesses in systems before attackers exploit themInternal vs. external, prioritization of fixes, automated
Automated ReportsSummarize security or system data regularlySaves time, tracks trends, customizable
DashboardsVisual representation of security and system data in real-timeQuick pattern recognition, SIEM integration, alerts
Packet CapturesRecord network traffic for detailed analysisDetects malicious activity, troubleshooting, requires analysis tools

Exam Tip:

  • Remember “VADP”: Vulnerability scans, Automated reports, Dashboards, Packet captures. These are extra investigative tools beyond logs.
  • Know why each is used: scanning finds weaknesses, reports summarize data, dashboards visualize it, and packet captures provide detailed traffic insight.

Leave a Reply

Your email address will not be published. Required fields are marked *

Buy Me a Coffee