exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 180 discussion

Actual exam question from CompTIA's CS0-002
Question #: 180
Topic #: 1
[All CS0-002 Questions]

During a review of SIEM alerts, a security analyst discovers the SIEM is receiving many alerts per day from the file-integrity monitoring tool about files from a newly deployed application that should not change. Which of the following steps should the analyst complete FIRST to respond to the issue?

  • A. Warn the incident response team that the server can be compromised.
  • B. Open a ticket informing the development team about the alerts.
  • C. Check if temporary files are being monitored.
  • D. Dismiss the alert, as the new application is still being adapted to the environment.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
rcharger00
Highly Voted 3 years, 5 months ago
I believe this is A. A - file-integrity for the application shows files are being changed "that should not change"...so potentially a breach could be occurring. At a minimum it's worth investigating/escalating B - "a newly deployed application" meaning it's already in production, shouldn't need to go back to the Dev team C - the SIEM sounds as though it's already configured to monitor the appropriate files "that should not change" D - while it's possible some sort of "adapting" needs to take place it doesn't seem logical here to disregard the alert in case it was an actual issue
upvoted 20 times
...
Davar39
Highly Voted 3 years ago
Selected Answer: C
I am going with C on this one, since it is an onboarding asset some alerting configurations might need fine tuning. Verifying the root cause of the problem should be the first thing to do. I don't think alerting the incident team or developers without providing any useful information would help.
upvoted 9 times
MacherGaming
3 years ago
Agreed. Detect, then analyze
upvoted 1 times
...
...
RobV
Most Recent 1 year, 6 months ago
Selected Answer: C
NEWLY DEPLOYED is the key here. The FIRST step the security analyst should complete to respond to the issue of numerous file-integrity monitoring alerts from a newly deployed application is: C. Check if temporary files are being monitored. This step involves investigating whether the file-integrity monitoring tool is configured to monitor temporary files generated by the newly deployed application. Sometimes, legitimate changes, such as those related to temporary files, can trigger false positives in file-integrity monitoring. By checking the configuration and monitoring settings, the analyst can determine if the alerts are indeed related to expected and harmless changes. If temporary files are being monitored, the configuration can be adjusted to exclude them from triggering alerts.
upvoted 1 times
...
skibby16
1 year, 7 months ago
Selected Answer: C
The analyst should check if temporary files are being monitored first to respond to the issue. Temporary files are files that are created and used by applications for various purposes, such as storing data temporarily or caching data for faster access. However, temporary files are not meant to be permanent and are usually deleted when they are no longer needed or when the application is closed. Therefore, monitoring temporary files can generate many alerts from the file-integrity monitoring tool that are not relevant or useful for security purposes. The analyst should check if temporary files are being monitored and exclude them from the monitoring scope to reduce the number of alerts and focus on the files that should not change.
upvoted 1 times
...
32d799a
1 year, 7 months ago
Selected Answer: C
C. Check if temporary files are being monitored. The first step the security analyst should take is to investigate the cause of the alerts. Checking if temporary files are being monitored is a crucial step in understanding whether the alerts are legitimate or if there is a misconfiguration in the file-integrity monitoring tool. Temporary files can often change and trigger alerts, so it's important to determine whether these files are expected to change as part of normal application behavior.
upvoted 1 times
...
kumax
1 year, 8 months ago
Selected Answer: B
ChatGPT: When a security analyst discovers that the SIEM (Security Information and Event Management) system is generating an excessive number of alerts from a file-integrity monitoring tool regarding files from a newly deployed application that should not change, the first step to respond to this issue is typically to "investigate the cause of these alerts". Here's what the analyst should do as the FIRST step: Identify the Alerts: Determine which specific files or directories are generating the alerts. This may involve reviewing the alert logs, SIEM dashboards, or the output from the file-integrity monitoring tool.
upvoted 1 times
581777a
1 year, 8 months ago
just said C for me... can't be trusted.
upvoted 1 times
...
...
[Removed]
1 year, 10 months ago
Selected Answer: C
Temporary files should not be included in monitoring.
upvoted 1 times
...
salmonIsDecent
1 year, 11 months ago
Selected Answer: C
C. Check if temporary files are being monitored. By checking if temporary files are being monitored, the analyst can verify whether the file integrity monitoring tool is generating legitimate alerts or if the alerts are triggered by temporary files that can change as part of the application's normal behavior. Temporary files are often created and modified during the operation of applications, and monitoring them might not be necessary for detecting security incidents. After confirming whether temporary files are indeed being monitored and assessing the significance of the alerts, the analyst can take appropriate action, such as notifying the incident response team or informing the development team if there is a genuine security concern or if the alerts are false positives. Dismissing the alert without proper investigation should not be the first course of action.
upvoted 1 times
...
heinzelrumpel
1 year, 11 months ago
Selected Answer: A
This question is a weird one. If the application has gone through testing and staging then if FIM had been misconfigured they all should have noticed. If we can rely on the fact, that the monitoring process is correct, then the only conclusion left is that the server has been compromised leaving A as the only viable answer
upvoted 3 times
...
absabs
2 years, 4 months ago
I think that this event must be researched; i going with C. Because; we must verify that event.
upvoted 2 times
...
CatoFong
2 years, 4 months ago
Selected Answer: C
C. is for correct
upvoted 1 times
...
Abyad
2 years, 7 months ago
Selected Answer: C
I am using SIEM every day I am 100% sure this is C.
upvoted 2 times
...
TheStudiousPeepz
2 years, 8 months ago
Selected Answer: C
Verify = Check = C
upvoted 2 times
...
choboanon
2 years, 8 months ago
Selected Answer: C
A. Warn the incident response team that the server can be compromised. - I'm guessing this is a typo and likely says 'has' been compromised. We don't know this for certain so I think A is wrong. The SIEM detected, now we have to check and confirm what is happening. B. Open a ticket informing the development team about the alerts. -it's already deployed. No point for dev team here except to have them review after further investigation. C. Check if temporary files are being monitored. - many files changes everyday sounds like temp. files to me. D. Dismiss the alert, as the new application is still being adapted to the environment. - obviously no.
upvoted 3 times
brollo
2 years, 3 months ago
Why do you say that A could be a typo? I agree with you that if it was 'has' been compromised instead of 'can' been compromised, A would have been wrong because we are not sure that server was compromised. But since it says 'can', I could be A in my opinion: SIEM alerts tell you that something weird is going on, so the server can actually be compromised
upvoted 1 times
...
...
marc4354345
2 years, 9 months ago
Selected Answer: C
The description suggests that many files change many times per day, which is imo typical for temporary files. Additionally "newly deployed application" hints at a possible initial operational misconfiguration.
upvoted 5 times
...
piotr3439
2 years, 9 months ago
Selected Answer: A
In my opinion A.
upvoted 3 times
...
miabe
2 years, 11 months ago
Selected Answer: C
looks good to me
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...