exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 372 discussion

Actual exam question from CompTIA's CS0-003
Question #: 372
Topic #: 1
[All CS0-003 Questions]

A SOC analyst observes reconnaissance activity from an IP address. The activity follows a pattern of short bursts toward a low number of targets. An open-source review shows that the IP has a bad reputation. The perimeter firewall logs indicate the inbound traffic was allowed. The destination hosts are high-value assets with EDR agents installed. Which of the following is the best action for the SOC to take to protect against any further activity from the source IP?

  • A. Add the IP address to the EDR deny list.
  • B. Create a SIEM signature to trigger on any activity from the source IP subnet detected by the web proxy or firewalls for immediate notification.
  • C. Implement a prevention policy for the IP on the WAF.
  • D. Activate the scan signatures for the IP on the NGFWs.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Popeyes_Chicken
Highly Voted 4 months ago
Selected Answer: B
Stuck between B and D depending on what "further activity" entails, but I'm going with B. Preventing a precursor to a potential attack doesn't seem like it covers the full scope of what they're looking for in "further activity". However, using a SIEM to trigger on any activity from the source would allow an analyst to respond more effectively to tactic shifts / provide a wider safety net. D seems to narrow.
upvoted 5 times
...
Justheretolook
Most Recent 1 week, 4 days ago
Selected Answer: D
The best action for the SOC to take in this scenario is: D. Activate the scan signatures for the IP on the NGFWs. ⸻ Here’s why: • The activity involves reconnaissance in short bursts, which is often indicative of scanning or probing behavior. • The perimeter firewall is currently allowing the traffic, which means the source IP is not yet being blocked. • The NGFW (Next-Generation Firewall) can inspect traffic and apply intrusion prevention signatures or scan detection policies. • Activating scan signatures for that IP will help detect and block future scanning behavior at the network edge, preventing further reconnaissance attempts.
upvoted 1 times
...
Only12go
3 weeks, 3 days ago
Selected Answer: D
A. Add the IP to the EDR deny list: EDR operates on endpoints. While the destination hosts are covered, this won't prevent initial connection attempts or protect other network assets. B. Create a SIEM signature for alerting: Helpful for visibility, but reactive only—doesn't block the activity. Good for correlation, but not a defense action. C. Implement WAF policy: A WAF is only effective against HTTP/S traffic targeting web applications. If the reconnaissance includes non-web protocols (which is likely), this won't stop it. 🛡️ Summary: D is the most comprehensive and proactive defense measure—it ensures reconnaissance from that IP is detected and blocked at the perimeter, protecting all internal assets, not just those with EDR.
upvoted 2 times
...
Cyde
4 months ago
Selected Answer: D
I'm going with D because the security team is enabling specific security rules on the NGFWs to monitor and possibly block malicious activities associated with a particular IP address based on known threat signatures
upvoted 1 times
Cyde
4 months ago
and the question says ..."the best action for the SOC to take to protect against any further activity from the source IP"...
upvoted 1 times
...
...
Wolf541
4 months, 1 week ago
Selected Answer: A
according to chat gpt:Adding the IP address to the EDR (Endpoint Detection and Response) deny list is the best immediate action in this scenario because it blocks further potential malicious activity from the source IP at the endpoint level. This approach directly protects the high-value assets, which already have EDR agents installed. It ensures the IP cannot interact with those critical systems, even if the traffic reaches them.
upvoted 1 times
Popeyes_Chicken
4 months ago
EDR works at the endpoint level. It doesn't prevent further reconnaissance at the network perimeter.
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...