exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 56 discussion

Actual exam question from CompTIA's CS0-002
Question #: 56
Topic #: 1
[All CS0-002 Questions]

Which of the following threat classifications would MOST likely use polymorphic code?

  • A. Known threat
  • B. Zero-day threat
  • C. Unknown threat
  • D. Advanced persistent threat
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
blehbleh
Highly Voted 2 years, 8 months ago
The answer should be A. According to the Compita study guide there are only two threat classifications which are known and unknown. APT is a threat actor type and Zero day is a type of malware or threat but not a threat classification. Hope this helps.
upvoted 18 times
2Fish
2 years, 1 month ago
agree. A is the best answer here.
upvoted 1 times
...
...
adrianlacatus
Highly Voted 3 years, 2 months ago
Selected Answer: A
Polymorphic malware is a type of malware that constantly changes its identifiable features in order to evade detection, therefore its a known threat. While APTs may use polymorphic code, it does not specify anywhere about the characteristics of APTs - coordination, resources, persistence, capability or intent.
upvoted 10 times
akinbas
2 years, 9 months ago
agree with A
upvoted 1 times
SolventCourseisSCAM
2 years, 6 months ago
agree on it. solvent course is scam as you predict
upvoted 1 times
...
...
...
fuzzyguzzy
Most Recent 5 months ago
Selected Answer: D
D. Advanced persistent threat According to my study guide, there's more than two Threat Classifications and APT is one of them.
upvoted 1 times
...
zecomeia_007
9 months, 2 weeks ago
Selected Answer: A
Polymorphic code is used to evade detection by changing its appearance while maintaining its malicious behavior. Advanced persistent threats (APTs) often employ such sophisticated techniques to remain undetected for extended periods while they target specific organizations or individuals.
upvoted 1 times
...
anhod1578
1 year, 2 months ago
Selected Answer: B
These are newly discovered vulnerabilities for which no patch or mitigation exists yet. Attackers often exploit zero-days by using sophisticated techniques like polymorphic code to evade detection until security researchers become aware of the threat and develop countermeasures.
upvoted 2 times
...
skibby16
1 year, 5 months ago
Selected Answer: C
C Unknown Threat here is a good explanation. Definitely a crappy question... https://www.paloaltonetworks.com/cyberpedia/what-are-unknown-cyberthreats
upvoted 1 times
...
Skywalker89
1 year, 5 months ago
answer is C: (reference:CYSA+ certmaster) Another example of a known unknown is that malware authors can use various obfuscation techniques to circumvent signature-matching. The exact form that such malware will take is unknown, but its likely use and operation within an attack is predictable, at least to some extent.
upvoted 1 times
...
kumax
1 year, 7 months ago
Selected Answer: D
ChatGPT: "Advanced persistent threa" comes first, then "Zero-day".
upvoted 2 times
...
naleenh
1 year, 8 months ago
Selected Answer: D
APTs are sophisticated threats that are often targeted at specific organizations. They are designed to avoid detection and evade traditional security measures. Polymorphic code is a type of malware that can change its code each time it is executed. This makes it difficult for antivirus software to detect and block.
upvoted 2 times
...
Big_Dre
1 year, 8 months ago
Selected Answer: A
only 2 types od threat classification ( known and unknown)
upvoted 1 times
...
Anaser
2 years ago
Selected Answer: B
B. Zero-day threat is the most likely threat classification to use polymorphic code. Polymorphic code is a type of code that can change its structure without changing its functionality, making it difficult for traditional signature-based antivirus systems to detect and block it. Zero-day threats are newly discovered vulnerabilities that have not yet been patched by vendors and are exploited by threat actors to carry out attacks. Since zero-day threats are unknown to security vendors and antivirus systems, attackers may use polymorphic code to evade detection and deliver their payloads.
upvoted 3 times
...
justauser
2 years ago
Selected Answer: C
[GPT4] In the context of the CompTIA Security+ exam, polymorphic code can be associated with different types of malware threats. Polymorphic code refers to malicious software that can change its code or behavior to evade detection by antivirus and other security software. Polymorphic malware can be categorized under the following threat classifications: Known and unknown. Unknown threats or zero-day threats would be the classification MOST likely to use polymorphic code. Polymorphic malware is specifically designed to evade detection and constantly change its code or behavior to avoid signature-based security solutions. This makes it more challenging for security researchers and software to identify and counter unknown polymorphic threats as compared to known ones.
upvoted 2 times
...
kiduuu
2 years, 1 month ago
Selected Answer: A
Polymorphic code is a technique used by attackers to modify the code of malicious software, such as viruses or trojans, so that it appears different each time it is executed while retaining its original functionality. This technique is often used to evade detection by signature-based antivirus software, which identifies malware based on its signature or pattern.
upvoted 2 times
...
khrid4
2 years, 1 month ago
Selected Answer: C
We know of Polymorphic code concept that it is evading detection by means of changing its signature/appearance while retaining its functionality. As it evades detection, it bypass AV detection making it "Unknown". Since as everyone pointed out that this asks for threat classification- Known vs Unknown, Jason Dion course from Udemy actually classified "Known Unknowns" as under "Unknown" threat classification. Known Unknowns - a classification of malware that contains obfuscation techniques to circumvent signature-matching and detection
upvoted 5 times
...
boletri
2 years, 2 months ago
Selected Answer: C
Historically, cybersecurity techniques depended very much on the identification of "static" known threats, such as viruses, rootkits, Trojans, and botnets. It is straightforward to identify and scan for this type of threat with automated software by matching the malicious code to a signature in a database of known malware. Unfortunately, many adversaries now have the capability to develop means of circumventing these security systems. The sophisticated nature of modern cybersecurity threats means that when classifying threats, it is important to be able to describe and analyze behaviors as well as enumerate known attack signatures. This type of threat classification underpins tools and procedures that can detect unknown threats. Official Comptia Cysa+ Material
upvoted 2 times
...
AaronS1990
2 years, 2 months ago
Taken directly from comptia CySA 002 exam objectives 1.1 "Threat classification - Known threat vs. unknown threat - Zero-day - Advanced persistent threat" Surely APT is the most likely to have access to this technology...
upvoted 2 times
...
IanRogerStewart
2 years, 2 months ago
Selected Answer: D
Going with D. APTs have the resources to create polymorphic malware, which traditional actors may not.
upvoted 4 times
narcosubs
1 year, 10 months ago
The concept of polymorphic code is to evade detection, as khrid4 mentioned above. And the main goal of APT is persistance, which requieres to be undetected.
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago