exam questions

Exam CAS-005 All Questions

View all questions & answers for the CAS-005 exam

Exam CAS-005 topic 1 question 27 discussion

Actual exam question from CompTIA's CAS-005
Question #: 27
Topic #: 1
[All CAS-005 Questions]

IoCs were missed during a recent security incident due to the reliance on a signature-based detection platform. A security engineer must recommend a solution that can be implemented to address this shortcoming. Which of the following would be the most appropriate recommendation?

  • A. FIM
  • B. SASEC. UEBA
  • D. CSPM
  • E. EAP
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
vicbersong
1 week, 6 days ago
Selected Answer: D
❌ Why the Others Are Less Suitable: A. FIM (File Integrity Monitoring) Monitors changes to files — good for detecting unauthorized modifications, but not sufficient for behavioral analysis or detecting unknown threats. B. SASE (Secure Access Service Edge) Network architecture concept combining networking and security — doesn’t directly address IoC detection. D. CSPM (Cloud Security Posture Management) Ensures cloud configurations comply with best practices — useful for preventative controls, not detection of novel attacks. E. EAP (Extensible Authentication Protocol) Authentication framework — not related to threat detection.
upvoted 1 times
...
vicbersong
1 week, 6 days ago
Selected Answer: D
✅ C. UEBA (User and Entity Behavior Analytics) Explanation: The issue described — missed IoCs due to reliance on signature-based detection — highlights a gap in detecting unknown or novel threats. Signature-based systems only catch known threats, so behavioral-based detection is needed to address this shortcoming. UEBA (User and Entity Behavior Analytics): Uses machine learning and analytics to establish baselines of normal behavior. Detects anomalies and suspicious patterns (e.g., unusual logins, data exfiltration) that may indicate compromise — even if there’s no known signature. Excellent for catching insider threats, account compromise, and sophisticated attacks that evade traditional tools.
upvoted 1 times
...
_Jannat
2 months, 1 week ago
Selected Answer: D
The best recommendation to address the shortcoming of missed IoCs is C. UEBA (User and Entity Behavior Analytics), as it provides advanced, behavioral-based detection that can identify suspicious activities, even those not matching known attack signatures.
upvoted 1 times
...
62314b7
3 months, 1 week ago
Selected Answer: D
Correct answer shows as "C", but there is no "C" option displayed. Just "A,B,D,E".
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago