exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 93 discussion

Actual exam question from CompTIA's CS0-002
Question #: 93
Topic #: 1
[All CS0-002 Questions]

A security analyst has discovered malware is spreading across multiple critical systems and is originating from a single workstation, which belongs to a member of the cyberinfrastructure team who has legitimate administrator credentials. An analysis of the traffic indicates the workstation swept the network looking for vulnerable hosts to infect. Which of the following would have worked BEST to prevent the spread of this infection?

  • A. Vulnerability scans of the network and proper patching
  • B. A properly configured and updated EDR solution
  • C. A honeynet used to catalog the anomalous behavior and update the IPS
  • D. Logical network segmentation and the use of jump boxes
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Remilia
Highly Voted 3 years, 6 months ago
Surprised it isn't D?
upvoted 14 times
usoldier
3 years, 6 months ago
lol right.. but segmenting a single workstation won't prevent it from happening again.. nor would it be feasible to segment a workstation every time it has a vulnerability. Understanding the what, why and how is important.
upvoted 4 times
...
...
MAGON
Highly Voted 3 years, 5 months ago
The answer is B I thought it was A at first, However after reading the following insert form Malwarebytes on the functions of a Endpoint Detection and Response, it definitely makes sense to go with B. EDR SUMMARY: This refers to EDR’s ability to capture images of an endpoint at various times and re-image or rollback to a previous good state in the event of an attack. EDR also gives administrators the option to isolate endpoints and prevent further spread across the network. Remediation and rollback can be automated, manual, or a combination of the two.
upvoted 10 times
mmm55555
3 years, 4 months ago
https://www.cisco.com/c/en/us/products/security/endpoint-security/what-is-endpoint-detection-response-edr-medr.html#~capabilities
upvoted 4 times
...
haykaybam
2 years, 9 months ago
Endpoint detection and response (EDR) focuses on logging and alerting functions rather than prevention per se. The aim is to alert administrators to an intrusion and allow them to respond quickly. B can never be an option.
upvoted 1 times
NerdAlert
2 years, 2 months ago
bruh. it's Endpoint Detection and RESPONSE. not Endpoint Detection and notification
upvoted 5 times
...
...
...
RobV
Most Recent 1 year, 6 months ago
Selected Answer: D
D. Logical network segmentation and the use of jump boxes
upvoted 1 times
...
grelaman
1 year, 9 months ago
Selected Answer: A
Always Patch your system, Is the first and most important rule and It is mandatory if you have to protect CRITICAL assets. That would have prevented any kind of spreaded infections.
upvoted 1 times
...
NerdAlert
2 years, 2 months ago
Selected Answer: B
I choose B because EDR could stop the infection at the host level, rather than allowing it to spread throughout the network segment before stopping the spread. I think D is good, but B is better especially the bigger the network segment gets.
upvoted 2 times
...
kiduuu
2 years, 2 months ago
Selected Answer: D
In this scenario, the malware is originating from a single workstation with legitimate administrator credentials. By implementing logical network segmentation and the use of jump boxes, the spread of the malware could be contained to the segment of the network where the infected workstation is located, rather than allowing it to spread to critical systems across multiple segments. While vulnerability scans and proper patching (A), properly configured and updated EDR solutions (B), and honeynets used to catalog anomalous behavior and update IPS (C) are all important security measures, they would not be as effective in preventing the spread of the malware in this specific scenario as logical network segmentation and the use of jump boxes.
upvoted 4 times
...
2Fish
2 years, 3 months ago
Selected Answer: C
C. implementing logical network segmentation, critical systems can be isolated from other less critical systems and users, limiting the potential spread of malware.
upvoted 1 times
2Fish
2 years, 3 months ago
Mistake, this should be D.
upvoted 4 times
...
...
AC6280
2 years, 4 months ago
I initially was leaning towards B because why wouldn't an EDR be able to detect and prevent infection? Microsoft Defender for Endpoint, for example, can perform Automated Investigation and Response (AIR) which includes isolating a device, quarantining files, etc. Also, it's mentioned the analyst who owns that workstation has valid admin creds, so has the malware escalated privileges and is it operating under that account? If so, would they just be able to connect to the jump host anyways? https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/automated-investigations?view=o365-worldwide https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/manage-auto-investigation?view=o365-worldwide#remediation-actions Given the details/context that this is more network based, however, I think the answer they want you to give is D (definitely a valid answer and should be part of the overall security posture regardless of the question).
upvoted 1 times
...
Cock
2 years, 4 months ago
chatGPT told me it's D
upvoted 3 times
attesco
1 year, 11 months ago
Never use chatGPT for this questions; because it does not make you think. Put on your thinking cap and don`t rely on ready made answer. It will not help you in life
upvoted 1 times
sudoaptgoaway
1 year, 9 months ago
Youre on a test bank site mr. noble
upvoted 7 times
...
...
...
Eric1234
2 years, 4 months ago
Selected Answer: D
Going with D
upvoted 2 times
...
mhop321
2 years, 5 months ago
Selected Answer: A
I believe the answer to be A. This is my reasoning: "the workstation swept the network looking for vulnerable hosts to infect" - so we know that this is the trigger for this attack. "Which of the following would have worked BEST to prevent the spread of this infection?" - So which answer would be best to prevent this infection? A. Vulnerability scans of the network and proper patching - patching the vulnerable hosts would stop/prevent this from happening again.
upvoted 3 times
...
forklord72
2 years, 8 months ago
Selected Answer: D
Please read the question everyone. B will not stop the spread, it will prevent it from happening in the first place. Administrator credentials were exploited, the only option the prevents the SPREAD is D.
upvoted 6 times
SolventCourseisSCAM
2 years, 8 months ago
agree w u
upvoted 1 times
...
saspurstx21
2 years, 5 months ago
The question states "What WOULD have stopped the spread" meaning, what would have prevented it to happening in the first place.." It does not ask "What can stop further spreading?"
upvoted 2 times
...
...
Felix010
2 years, 8 months ago
Selected Answer: B
I think deploying and configuring the endpoint security is the best option
upvoted 1 times
...
KingDeeko
2 years, 8 months ago
Selected Answer: C
A honeynet is a network set up with intentional vulnerabilities hosted on a decoy server to attract hackers. They are expressly set up to attract and trap interlopers who attempt to penetrate other people's computer systems... If that machine was compromised with malware that scanned for targets that were vulnerable it would hit that honeynet and become trapped and thats that.. it would be stuck in there for the SOC to study and analyze for further review.
upvoted 4 times
...
MortG7
2 years, 8 months ago
Selected Answer: B
I selecting B for the following reasons: How EDR Works EDR security solutions use advanced techniques to proactively detect and respond to threats. Data Collection EDR tools install software agents on all devices and collect telemetry data from communications, queries, processes, and user logins which get stored in central logs. Data Analysis Behavioral analysis establishes a baseline of normal activity over time to help identify anomalies that represent malicious behavior. Response In case of a suspected breach, EDRs quarantine malware while isolating and testing the malicious file in a safe sandboxed environment.
upvoted 1 times
...
haykaybam
2 years, 9 months ago
Selected Answer: D
The keyword here is to prevent the spread of the infection - can only be best acheived by use of network segmentation and use of jump boxes. Answer is D.
upvoted 2 times
...
PTcruiser
2 years, 9 months ago
Selected Answer: B
Using EDR, the threat hunters work proactively to hunt, investigate and advise on threat activity in your environment. When they find a threat, they work alongside your team to triage, investigate and remediate the incident, before it has the chance to become a full-blown breach https://www.crowdstrike.com/cybersecurity-101/endpoint-security/endpoint-detection-and-response-edr/#:~:text=Using%20EDR%2C%20the%20threat%20hunters,become%20a%20full%2Dblown%20breach.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...