Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CAS-004 topic 1 question 267 discussion

Actual exam question from CompTIA's CAS-004
Question #: 267
Topic #: 1
[All CAS-004 Questions]

A security analyst has concerns about malware on an endpoint. The malware is unable to detonate by modifying the kernel response to various system calls. As a test, the analyst modifies a Windows server to respond to system calls as if it was a Linux server. In another test, the analyst modifies the operating system to prevent the malware from identifying target files. Which of the following techniques is the analyst MOST likely using?

  • A. Honeypot
  • B. Deception
  • C. Simulators
  • D. Sandboxing
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Amin4799
Highly Voted 1 year ago
Selected Answer: B
Deception involves creating a false reality that attackers or malware will interact with, in order to detect and respond to threats
upvoted 5 times
...
e020fdc
Most Recent 2 months, 1 week ago
Selected Answer: D
I was torn between C and D, but sandboxing is more specific to security analysts so that's what I'll go with.
upvoted 1 times
...
Anarckii
4 months ago
Selected Answer: C
No where in the question does it state that the analyst is doing this in a separate environment isolated form the current environment. So it can't be a sandbox. In the question it even tells us " As a test, the analyst modifies a Windows server to respond to system calls as if it was a Linux server" This means he is doing it on an actual sever to SIMULATE a linux sever.
upvoted 1 times
...
Anarckii
4 months, 1 week ago
Selected Answer: B
It comes down to B and D. No where in the scenario talks about isolating and modifying files on a server. So it would be deception, the analyst is deliberately modifying the system to respond falsely to system calls, creating deception for the malware
upvoted 1 times
Anarckii
3 months, 4 weeks ago
Changing to C
upvoted 1 times
...
...
nuel_12
5 months, 1 week ago
Selected Answer: B
deception is the best answer from the scenario
upvoted 2 times
...
hheerreessjjoohhnnyy
6 months, 1 week ago
Selected Answer: D
Going with Sandboxing (D) on this one. Only other option would be (B) Deception, but that doesn't quite fit this scenario according to the definition below: "Deception technology is a category of incident detection and response technology that helps security teams detect, analyze, and defend against advanced threats by enticing attackers to interact with false IT assets deployed within your network." https://www.rapid7.com/fundamentals/deception-technology/
upvoted 3 times
...
POWNED
6 months, 3 weeks ago
Selected Answer: D
Sandbox
upvoted 3 times
...
Meep123
6 months, 3 weeks ago
Selected Answer: D
Im going with sandboxing here. From reading, it seems deception is a more in-depth and automated version of honey-potting, which can be scaled up to a mimic of a production network to be used to monitor advanced cyber threats.
upvoted 2 times
Meep123
6 months, 3 weeks ago
Here's one of the better explainations I've seen: "At a high level, sandboxing involves installing and allowing malware to run for behavioral observation, while honeypots and nets focus on the analysis of threat actors conducting reconnaissance on an infiltrated network, and security deception is the more recent conception of advanced intrusion detection and prevention. Deception technologies offer more realistic honeynets that are easier to deploy and provide more information to users, but they come with higher budgetary and expertise requirements that typically restrict their use to large enterprises ... at least for the moment." Further research shows a lot of pairing of honeynets and security deception technologies and descriptions, and expanded upon together. In summary, "Deception" here, I believe, is to be tricky and invoke a human understanding of deception (lying), rather than a security understanding (advanced honeynet).
upvoted 1 times
...
...
imather
9 months ago
Selected Answer: D
Deception technology is used to observe how an attacker moves through the network and exploits an asset. I haven't read on deceptive technology being actively modified to test malware. This sounds more like a sandbox.
upvoted 1 times
...
fb2fcb1
9 months, 2 weeks ago
Selected Answer: B
B. Deception The analyst is most likely using deception techniques to deceive the malware and hinder its functionality. Deception involves creating an environment that misleads or confuses attackers or malware, making it harder for them to carry out their malicious activities. In the given scenario, the analyst modifies the Windows server to respond to system calls as if it was a Linux server. This deceptive modification aims to confuse the malware, which might be specifically designed to target Windows systems. By presenting a different system environment, the analyst disrupts the malware's ability to execute its intended functionality. Additionally, the analyst modifies the operating system to prevent the malware from identifying target files. This manipulation further adds to the deception strategy by hiding or altering the expected system behavior, making it challenging for the malware to locate and access its intended targets. Overall, these actions align with the concept of deception as a defensive technique to mislead and impede the functionality of malware.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...