exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 151 discussion

Actual exam question from CompTIA's CS0-003
Question #: 151
Topic #: 1
[All CS0-003 Questions]

After completing a review of network activity, the threat hunting team discovers a device on the network that sends an outbound email via a mail client to a non-company email address daily at 10:00 p.m. Which of the following is potentially occurring?

  • A. Irregular peer-to-peer communication
  • B. Rogue device on the network
  • C. Abnormal OS process behavior
  • D. Data exfiltration
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Kmelaun
Highly Voted 6 months, 2 weeks ago
Selected Answer: D
I would say D. Data Exfiltration because it is unexpected outbound communication. Especially because it's been happening daily and the analyst is just now discovering it. You can find rogue devices with scans or sweeps according to Certmaster but I think they would've gave us more information if they wanted us to choose rogue devices.
upvoted 6 times
...
Ree1234
Highly Voted 5 months, 2 weeks ago
Selected Answer: D
The question says " Which of the following is potentially occurring?" the keyword there " POTENTIALLY".....that device can exfiltrate data through that email...
upvoted 6 times
...
b0ad9e1
Most Recent 10 months, 3 weeks ago
Selected Answer: D
Obviously D.
upvoted 3 times
...
deeden
11 months, 1 week ago
Selected Answer: D
Thank you for this question. It gives familiarization to tricks so test takers may be more aware. It says the team discovered a device that sends outbound email to a non-corporate address - but just not enough information to conclude that it's a rogue device. It might as well be a compromised workstation. There is definitely some outbound communication happening but not enough information to conclude that there's data being taken. A lot is left to the imagination.
upvoted 1 times
deeden
11 months, 1 week ago
I vote D because most rogue device I encounter was used for inbound traffic - usually some kind of illegal router or proxy. I would imagine a rogue workstation tapping in to a local network will be subjected to Firewall rules and network access control.
upvoted 2 times
...
...
LOMCLOTRMC
11 months, 1 week ago
Selected Answer: D
It is not a point of debate whether it is an unauthorized device. The reliable fact is that information is flowing outside.
upvoted 1 times
...
[Removed]
11 months, 2 weeks ago
Selected Answer: D
After revision, I agree D is the best answer. Beaconing (answer A and maby C) would be done through HTTP/HTTPS typically. If I want to send a mass amount of PII, I could easily do so through an email (which is the attack vector used in the question).
upvoted 1 times
...
LiveLaughToasterBath
11 months, 2 weeks ago
Selected Answer: D
Terribly worded question. The device is not communicating to a peer, as in another device on same network. A rogue device most likely wouldn't show up on a scan. I don't know what abnormal OS process that would do this. Data Exfil seems like the most correct out of all of these.
upvoted 1 times
...
[Removed]
11 months, 3 weeks ago
Selected Answer: B
B) rogue device on the network A) the word irregular throws me off. The question states it happens daily, at 10:00 PM. This is an established, determinable, regular attack. B) Seems like something CompTIA would ask for TBH C) nothing about the OS can be deduced from this. It's via email, not a system process D) No data is being exfilled. The emails could be investigated as part of DLP efforts.
upvoted 1 times
geenoe
11 months, 2 weeks ago
Focus on the question. It says potentially occuring. You have no clue if they have DLP implemented or not. D is the best answer
upvoted 2 times
[Removed]
11 months, 2 weeks ago
After revision, I agree D is the best answer. Beaconing would be done through HTTP/HTTPS typically. If I want to send a mass amount of PII, I could easily do so through an email (which is the attack vector used in the question).
upvoted 1 times
...
...
...
chaddman
1 year ago
Selected Answer: D
Data Exfiltration (D): The most suspicious part of the activity is the daily sending of an email to a non-company address, which is a common method for data exfiltration. The timing (10:00 p.m.) also suggests an attempt to avoid detection.
upvoted 2 times
...
kmordalv
1 year ago
Selected Answer: D
If CompTIA were looking for answer B, it would not indicate in the question that the device sends data through the mail. It asks what is happening, or what action is taking place. Therefore, the answer to this question is D. It is true that it does not indicate what it is sending but it is transparent. The fact of discovering a device and that it is sending mail should be significant of a data exfiltration.
upvoted 2 times
stolleryp
1 year ago
I agree with danscbe - CompTIA are looking for the answer B, they are catching us out for assuming that data is being exfiltrated
upvoted 1 times
kmordalv
1 year ago
And is it assumed to be an unauthorized device? The question only says that a device has been found sending a mail, it does not say that it is suspicious or that the device should not be there. If I am a network administrator, for example, and I see several connected computers I can also say that I found a device sending a mail. On the other hand, this device sends an email during non-business hours to an external email address, which is suspicious. Both answers could be equally valid. Now, knowing CompTIA I think you are right and the answer sought is the B
upvoted 1 times
...
...
...
danscbe
1 year, 1 month ago
Selected Answer: B
Let's break this down. It helps to take it one word at a time sometimes in CompTIA questions. After completing a review of network activity, the threat hunting team DISCOVERED a device on the network. This means this device wasn't known about to be on the network at all. From there, this device is regularly sending outbound emails. We have nothing to support any irregular peer-to-peer communication, and there is nothing showing the OS of this device is behaving abnormally. It is sending email through a mail client. That is normal. This leaves us with B and D. We cannot say data is being exfiltrated because there is nothing in the question which states what the email regularly being sent contains. For that matter, this behavior could be an advanced form of beaconing somehow. This only leaves us with deducing a rogue device has gotten onto the network.
upvoted 3 times
geenoe
11 months, 2 weeks ago
You forgot to break down the question, the most important of this scenario, lol.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago