exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 97 discussion

Actual exam question from CompTIA's CS0-002
Question #: 97
Topic #: 1
[All CS0-002 Questions]

A security analyst has received reports of very slow, intermittent access to a public-facing corporate server. Suspecting the system may be compromised, the analyst runs the following commands:

Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?

  • A. Run crontab -r; rm -rf /tmp/.t to remove and disable the malware on the system.
  • B. Examine the server logs for further indicators of compromise of a web application.
  • C. Run kill -9 1325 to bring the load average down so the server is usable again.
  • D. Perform a binary analysis on the /tmp/.t/t file, as it is likely to be a rogue SSHD server.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Obi_Wan_Jacoby
Highly Voted 4 years, 3 months ago
Well, the question states "which of the following should the analyst do NEXT to further the investigation?" Answers A and and C are actions to kill 1325 or remove the malware, but the question says what to do next to further the "investigation". I'm going with answer B
upvoted 28 times
ufovictim
4 years, 3 months ago
Seconded, while A would kill the possible malware it might hamper further investigation. The wording of the question suggests B is correct
upvoted 4 times
...
comptia23
3 years, 8 months ago
I do also agree with B. Even when comptia tries to let "t" look suspicious, it has no cputime (ps ax) and is not the reason for our high resources exhaustion.
upvoted 2 times
...
2Fish
2 years, 1 month ago
Agree.
upvoted 1 times
...
...
I_heart_shuffle_girls
Highly Voted 4 years, 3 months ago
A. We dont know what that is yet. B. Examine the server logs for further indicators of compromise of a web application. C. We dont know the amount of resources being used. D. None of the netstat pids match.
upvoted 7 times
...
grelaman
Most Recent 1 year, 8 months ago
Selected Answer: D
Here's the breakdown of why this is the most appropriate next step: 1. The uptime command shows a very high load average, indicating that the server is under significant stress. A high load average can be a sign of a rogue process consuming system resources. 2. The crontab -1 command reveals a suspicious cron job running every minute, executing the /tmp/.t/t file. This is unusual and could indicate malicious activity. 3. The ps command shows a process with the ID 1325 running /tmp/.t/t. This process appears suspicious and may be the source of the high load average.
upvoted 1 times
grelaman
1 year, 8 months ago
4. The netstat output indicates an SSH connection on port 8394, which could be related to the suspicious process. Given these findings, it's essential to investigate the /tmp/.t/t file to determine its nature and whether it is indeed a rogue SSHD server or a potentially malicious program. Analyzing the binary will provide insights into its functionality and whether it poses a security threat.
upvoted 1 times
...
...
Xoomalla
1 year, 8 months ago
I will go for D, below is my reasoning A. Run crontab -r; rm -rf /tmp/.t to remove and disable the malware on the system. --> This is more like mitigating the problem not INVESTIGATING it. B. Examine the server logs for further indicators of compromise of a web application. --> Could be possible answer C. Run kill -9 1325 to bring the load average down so the server is usable again. --> Again this will mitigate the problem. However, the malware will run again since thr cron job scheduled to run each minute. D. Perform a binary analysis on the /tmp/.t/t file, as it is likely to be a rogue SSHD server. --> I will go to this option, since you have malicious file next step is to decide if it's malicious or not and figure out what it does in the system
upvoted 2 times
...
tatianna
2 years, 1 month ago
CHAT GPT Based on the output from the commands, the analyst has identified a suspicious file, /tmp/.t/t, which is running as a process with the PID 1325. The file command shows that it is a binary file. Therefore, the NEXT step the analyst should take to further the investigation is to perform a binary analysis on the file. This may involve examining the file's behavior, determining its origin, and identifying any associated threats or malware. It is important to do this analysis carefully, as malware can be designed to evade detection and removal attempts. Once the analyst has identified the nature of the threat, they can take appropriate action to contain and remediate the issue.
upvoted 2 times
khrid4
2 years, 1 month ago
my first answer is also D, but after I saw I_heart_shuffle_girls answer, D shows that netstat did not match any result for 1325. By "acting" as a server, then it must show artifacts as PID 1325 listening to traffic from clients. But this is not the case.
upvoted 1 times
...
...
CatoFong
2 years, 2 months ago
Selected Answer: B
B. is correct as we are advancing the investigation
upvoted 1 times
...
Eric1234
2 years, 3 months ago
Selected Answer: B
B seems the most likely
upvoted 1 times
...
miabe
2 years, 9 months ago
Selected Answer: B
looks good to me
upvoted 1 times
...
JenG59
2 years, 11 months ago
Public facing and SSH to private, check the logs
upvoted 1 times
...
BlackdaRipper
3 years, 2 months ago
B is correct.
upvoted 2 times
...
Ham_Solo
3 years, 9 months ago
It clearly states public facing, and SSH to a private 172.168.*.* address is internal LAN traffic. I'm going to check logs for further IOC.
upvoted 1 times
...
Alizadeh
4 years, 1 month ago
B is correct
upvoted 3 times
...
Alizadeh
4 years, 1 month ago
B is correct
upvoted 1 times
...
Umer24
4 years, 3 months ago
send me a mail ryan23680 at yahoo for new Cysa+ cs0-002 questions and we can find the correct answers together.
upvoted 1 times
Berlus
3 years, 11 months ago
If you can't share your thoughts here, then we don't need you on this platform
upvoted 15 times
...
...
RokzyBalboa
4 years, 3 months ago
I would do A first. The cronjob is running every minute, and every minute that goes by, is another minute of suspected malicious activity. I would stop the malicious activity first before attempting to examine server logs. Note also the .t folder is a hidden folder, which would add to the suspicion of why a cronjob would be running something that is in a hidden folder. And note the established ssh session, which likely means a backdoor exists to the system, and the cronjob likely ensures the persistent connection for the malicious entity.
upvoted 1 times
lollo1234
3 years, 10 months ago
Fair point, however notice you can't just remove the cronjob, the option also includes permanently deleting the suspicious file. The best answer is remove the cronjob, kill the process, and review the logs, but that is not an option, so I go with B.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago