exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 394 discussion

Actual exam question from CompTIA's CS0-002
Question #: 394
Topic #: 1
[All CS0-002 Questions]

A security analyst for a large pharmaceutical company was given credentials from a threat intelligence resources organization for internal users, which contain usernames and valid passwords for company accounts. Which of the following is the first action the analyst should take as part of security operations monitoring?

  • A. Run scheduled antivirus scans on all employees’ machines to look for malicious processes.
  • B. Reimage the machines of all users within the group in case of a malware infection.
  • C. Change all the user passwords to ensure the malicious actors cannot use them.
  • D. Search the event logs for event identifiers that indicate Mimikatz was used.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
HotWings8
Highly Voted 1 year, 11 months ago
I was leaning more towards C, but the last sentence in the question includes the word "monitoring" and knowing Comptia are so specific, so changed to D now.
upvoted 5 times
...
[Removed]
Most Recent 1 year, 7 months ago
Selected Answer: D
Prep > Identification > Containment > Eradication > Recovery > Lessons Learned. I don't know how some of you guys are going straight to C with confirming D first.
upvoted 1 times
...
5H4K1R
1 year, 7 months ago
Selected Answer: D
The question states the "first action the analyst should take as part of security operations monitoring?" not remediation or fixes but to monitor what happened. Therefore it should be D. Search the event logs for event identifiers that indicate Mimikatz was used.
upvoted 1 times
...
grelaman
1 year, 7 months ago
Selected Answer: C
I think that the incident has been confimed now you have to contain the user's machines, the only option here to do so is C. There are many ways that the attackers could have obtained the credential, the most common one is through a phising campaign, so not necessarily only trying to find mimikatz artifacts would be enough to determine how the breach was performed.
upvoted 1 times
...
LayinCable
1 year, 7 months ago
Selected Answer: C
I think it's a classic CompTIA move where they're just trying to get you to choose the FIRST thing you should do. Which in my mind would be to change the passwords first, that way, access is no longer available (yes, there are better ways to secure accounts, but those aren't specified.). THEN, start doing scans to see how the accounts were accessed. Analogy: if its cold out, you dont turn the heat on when the front door is wide open. you close it, so no more cold air can come in, then you turn the heat on. any other way would be useless and make no sense.
upvoted 1 times
[Removed]
1 year, 7 months ago
But what if Mimikatz was ran again after changing all passwords? You would look for Mimikatz in the event logs and then you would change all the passwords again. Then why not you start with searching the event logs for event identifiers that indicate mimikatz?
upvoted 1 times
...
...
skibby16
1 year, 8 months ago
Selected Answer: D
The first action the security analyst should take when provided with credentials from a threat intelligence resource is to search the event logs for event identifiers that indicate Mimikatz or similar credential dumping tools were used. This is a proactive step to identify any potential compromise of accounts within the organization. Changing passwords and running antivirus scans can be important subsequent actions, but initially, the focus should be on identifying potential threats and indicators of compromise.
upvoted 1 times
...
johndoe69
1 year, 10 months ago
Selected Answer: C
Priority would be to get change password immediately. You perform your analysis afterwards. Answer is C
upvoted 1 times
...
ProNerd
1 year, 11 months ago
Selected Answer: D
Mimikatz=looking for how all of the passwords would have been obtained to begin with
upvoted 1 times
...
Rori791
1 year, 11 months ago
Selected Answer: D
I agree with kyky!! Scanning all employees' machines (option A) is not practical or necessary in this scenario, they already have the list of names and passwords (as mentioned in the question) so why not just scan the devices of the affected users only? Scanning them devices of the affected users may be a more targeted approach to identifying any potential malicious processes or malware that may have been introduced as a result of the compromised credentials. + what if the attacker didn’t start any malicious processes or malware onto the affected devices. In that case, scanning all employees' machines is not going to provide any additional value to the investigation.
upvoted 1 times
...
tutita
2 years ago
Selected Answer: A
This question is very messy, it lacks of context, they are asking for "security operation monitoring", which leads to A or D (the ones that refers to monitoring) option d- Mimikatz is both an exploit on Microsoft Windows that extracts passwords stored in memory and software that performs that exploit. they are not mentioning microsoft OS. option A run a scan to check for malicious processes its the best on here.
upvoted 2 times
...
kyky
2 years ago
Selected Answer: D
2 / 2 In this scenario, the first action the security analyst should take as part of security operations monitoring is: D. Search the event logs for event identifiers that indicate Mimikatz was used. Mimikatz is a well-known tool used by attackers to extract credentials from compromised systems. Since the security analyst has received credentials that may have been compromised, searching the event logs for any indicators of Mimikatz usage will help identify any potential unauthorized access attempts or compromised accounts. By analyzing the event logs, the analyst can gain insights into any suspicious activities and take appropriate actions to mitigate any potential risks or threats.
upvoted 3 times
...
Dutch012
2 years ago
I think we need to change the passwords first and then start to check if any of the devices that use these accounts got compromised so it's C
upvoted 2 times
...
CyberCEH
2 years, 1 month ago
Asnwer C
upvoted 1 times
...
Hershey2025
2 years, 1 month ago
Answer is A
upvoted 1 times
Meowson
2 years, 1 month ago
Why not D?
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...