exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 84 discussion

Actual exam question from CompTIA's CS0-003
Question #: 84
Topic #: 1
[All CS0-003 Questions]

A security analyst is reviewing the following alert that was triggered by FIM on a critical system:



Which of the following best describes the suspicious activity that is occurring?

  • A. A fake antivirus program was installed by the user.
  • B. A network drive was added to allow exfiltration of data.
  • C. A new program has been set to execute on system start.
  • D. The host firewall on 192.168.1.10 was disabled.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
BanesTech
Highly Voted 1 year ago
Selected Answer: C
The suspicious activity described in the alert is: C. A new program has been set to execute on system start. This is indicated by the entry: ``` Host: Webserver01 Path: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Key Added: RunME (%appdata%\abc.exe) ``` which shows that a new registry key (`RunME`) was added under `HKLM\Software\Microsoft\Windows\CurrentVersion\Run`, pointing to an executable file (`%appdata%\abc.exe`), indicating that a program has been configured to run automatically when the system starts.
upvoted 13 times
YogiT
3 months, 1 week ago
FIM- File integrity monitoring -
upvoted 1 times
...
...
Freshly
Most Recent 5 months, 3 weeks ago
Selected Answer: C
Not only is the answer clearly understandable when looking at BanesTech comment but also understand what FIM does and now you can play process of elimination. Not be because that would be alerted by network monitoring not file integrity. Not D because definitely not file integrity. We wouldn't have an alert in FIM about IP. Between A and C, A is less likely because FIM monitors for programs and files already installed to ensure they haven't been tampered with. In addition, this alert doesn't tell us that something was downloaded by the threat actor. Hope that helps.
upvoted 2 times
...
thisguyfucks
1 year, 1 month ago
Selected Answer: B
I was thinking B here, not sure on why you guys are choosing C.
upvoted 2 times
voiddraco
8 months, 1 week ago
why'd you choose B?
upvoted 1 times
...
...
deeden
1 year, 5 months ago
Selected Answer: C
Agree with C. Options A and D doesn't make sense. and option B looks legitimate.
upvoted 1 times
...
[Removed]
1 year, 5 months ago
Selected Answer: C
Of the 5 alerts below, C seems to be the most malicious as this can establish persistence of malware. Host: Webserver01 Path: HKLM/Software/Microsoft/Windows/CurrentVersion/Personalization Key Added: Allow (1) --- Host: Webserver01 Path: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Key Added: RunME (%appdata%\abc.exe) --- Host: Webserver01 Path: HKCU\Printers\ConvertUserDevModesCount Key added: microsoft xps writer (2) --- Host: WEBSERVER01 Path: HKCU\Network\Z Key Added: Remote Path (192.168.1.0 CorpZ_Drive) --- Host: Webserver01 Path: HKLM\Software\Microsoft\PCHealthCheck Key added: Installed (1)
upvoted 3 times
...
kmordalv
1 year, 7 months ago
Selected Answer: C
Of the options described above, the most correct option is C.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago