exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 62 discussion

Actual exam question from CompTIA's CS0-003
Question #: 62
Topic #: 1
[All CS0-003 Questions]

An organization has activated the CSIRT. A security analyst believes a single virtual server was compromised and immediately isolated from the network. Which of the following should the CSIRT conduct next?

  • A. Take a snapshot of the compromised server and verify its integrity
  • B. Restore the affected server to remove any malware
  • C. Contact the appropriate government agency to investigate
  • D. Research the malware strain to perform attribution
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RobV
Highly Voted 11 months ago
Selected Answer: A
When a security analyst believes a single virtual server has been compromised and has isolated it from the network, the next steps for the CSIRT (Computer Security Incident Response Team) should focus on investigating and containing the incident. In this context, the most appropriate action would be: A. Take a snapshot of the compromised server and verify its integrity Explanation: Take a snapshot: Creating a snapshot involves capturing the current state of the virtual server, including its configuration and data. This snapshot can serve as a forensic image for later analysis. Verify its integrity: The CSIRT should analyze the snapshot to identify signs of compromise, understand the extent of the incident, and determine the nature of the compromise. Verifying the integrity involves checking for any unauthorized changes, unusual activities, or indicators of compromise.
upvoted 8 times
...
[Removed]
Highly Voted 11 months, 3 weeks ago
Selected Answer: A
Preserve the evidence after isolation. B makes sense no sense immediately after isolating. You would restore the system and lose all data prior to collecting for evidence / investigation? NIST doesn't recommend restoring prior to collecting the data...
upvoted 5 times
...
Frog_Man
Most Recent 11 months, 3 weeks ago
Going with "A" based upon CompTia's 6 step method to troubleshooting. Identify the problem, Establish a theory of probable cause Test the Theory. "A" would be the third step. It is a CompTia exam.
upvoted 2 times
...
beaup
1 year ago
Selected Answer: B
According to NIST Incident Response, once the infected system has been contained, the next step would be eradication & recovery (ie. restore the infected system) then you would verify the malware has been removed.
upvoted 2 times
[Removed]
11 months, 3 weeks ago
Preserve the evidence after isolation. B makes sense no sense immediately after isolating. You would restore the system and lose all data prior to collecting for evidence / investigation? NIST doesn't recommend restoring prior to collecting the data...
upvoted 3 times
...
...
kmordalv
1 year, 2 months ago
Selected Answer: A
The next action that the CSIRT should conduct after isolating the compromised server from the network is to take a snapshot of the compromised server and verify its integrity. Taking a snapshot and verifying its integrity can help preserve and protect any evidence or information related to the incident, as well as prevent any tampering, contamination, or destruction of evidence.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago