exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 226 discussion

Actual exam question from CompTIA's CS0-003
Question #: 226
Topic #: 1
[All CS0-003 Questions]

A security analyst observed the following activity from a privileged account:

• Accessing emails and sensitive information
• Audit logs being modified
• Abnormal log-in times


Which of the following best describes the observed activity?

  • A. Irregular peer-to-peer communication
  • B. Unauthorized privileges
  • C. Rogue devices on the network
  • D. Insider attack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
glenndexter
Highly Voted 1 year ago
Selected Answer: D
The observed activity from a privileged account, which includes accessing emails and sensitive information, modifying audit logs, and abnormal login times, best fits the description of: D. Insider attack. An insider attack occurs when a person with authorized access to an organization's systems and data misuses that access for malicious purposes. In this scenario, the activity observed suggests that a privileged insider, who has access to sensitive information and has the ability to modify audit logs, is engaging in unauthorized and potentially malicious actions. The abnormal login times further indicate suspicious behavior associated with the privileged account.
upvoted 5 times
...
braveheart22
Most Recent 2 months ago
Selected Answer: D
The best answer is D. Insider attack, and here's why: Accessing emails and sensitive information: This indicates someone with internal access is deliberately targeting sensitive data. Audit logs being modified: This is a strong indicator of malicious intent, as it's an attempt to cover tracks. Abnormal log-in times: This suggests activity outside of normal working hours, which is another red flag.
upvoted 1 times
...
Omo_Mushin
9 months, 2 weeks ago
D. Insider attack An insider attack involves a trusted individual within the organization, such as an employee or someone with privileged access, who misuses their access to harm the organization. The activities mentioned—accessing sensitive information, modifying audit logs, and abnormal log-in times—are indicative of someone with legitimate access behaving maliciously, which is characteristic of an insider attack.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago