exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 46 discussion

Actual exam question from CompTIA's CAS-004
Question #: 46
Topic #: 1
[All CAS-004 Questions]

A company's SOC has received threat intelligence about an active campaign utilizing a specific vulnerability. The company would like to determine whether it is vulnerable to this active campaign.
Which of the following should the company use to make this determination?

  • A. Threat hunting
  • B. A system penetration test
  • C. Log analysis within the SIEM tool
  • D. The Cyber Kill Chain
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kycugu
Highly Voted 2 years, 5 months ago
This is very simple ....Pen-test to use the specific exploit to determine the result of the threat intelligence. answer is B
upvoted 8 times
...
Boats
Highly Voted 2 years, 8 months ago
Selected Answer: B
Pen testing tells you how an opponent could get into your environment. It emphasizes the potential damage of not hardening the environment by showing how different vulnerabilities might be exploited or identifying insecure IT practices. Threat hunting tells you who is already in your environment and what they're up to. It deals with the actual state of the environment and shows what threats are targeting the company. They’re both methods used by defenders to bolster their security, but the former deals with possibly scenarios which may lead to a breach, while the latter works backwards- first looking for a breach, then working backwards to a vulnerability.
upvoted 5 times
...
IT_Master_Tech
Most Recent 6 months, 3 weeks ago
A.
upvoted 1 times
...
grelaman
9 months ago
Selected Answer: A
The first step of threat hunting: Establishing a Hypothesis: For example, you might initiate a threat hunting project if your threat intelligence sources show that a new campaign type or adversary group has been identified, or that companies operating in similar markets have been hit by data breaches. (reference: The Official CompTIA CySA+ Student Guide)
upvoted 1 times
...
23169fd
10 months ago
Selected Answer: B
Threat Hunting: Best used when there is a need to quickly determine if an attack has already occurred or if there are signs of compromise related to the specific threat. Penetration Testing: Best used to validate whether the environment is susceptible to the specific vulnerability and to understand the potential impact and exploitability.
upvoted 4 times
...
Anarckii
1 year, 5 months ago
Selected Answer: B
"The company would like to determine whether it is vulnerable to this active campaign" The only way for them to determine this is by pentesting
upvoted 3 times
...
imather
1 year, 9 months ago
Selected Answer: B
Threat hunting sounds like a good answer, but remember threat hunting is "proactively searching for cyber threats that are lurking undetected in a network." You look for unusual behavior and IOCs. Threat hunting is not a vulnerability assessment. You would pentest to determine if you were actually vulnerable. https://www.crowdstrike.com/cybersecurity-101/threat-hunting/
upvoted 1 times
...
BiteSize
1 year, 9 months ago
Selected Answer: B
verify if the exploit works. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 2 times
...
AaronS1990
1 year, 11 months ago
Selected Answer: B
Pentest. This is the only way to be sure it is a genuine problem.
upvoted 2 times
...
CASP_Master
1 year, 12 months ago
A. Threat hunting would be the best option to determine whether the company is vulnerable to a specific active campaign. Threat hunting involves proactively searching through networks or endpoints to detect and isolate advanced threats that evade existing security solutions. By performing threat hunting, the company can identify any indicators of compromise (IoCs) or unusual activity that may be associated with the known vulnerability and active campaign. System penetration testing, log analysis, and the Cyber Kill Chain are all useful security techniques, but they are not specifically designed for identifying vulnerabilities in response to a specific active campaign.
upvoted 2 times
...
Geofab
2 years, 1 month ago
Selected Answer: B
conducting a Pen Test seems the most logical to me
upvoted 2 times
...
FoxTrotDG
2 years, 1 month ago
Selected Answer: C
The SIEM tool can be used to scan logs for evidence of the vulnerability, such as attempts to exploit it. If the vulnerability is present, the SIEM tool can also be used to identify the source of the attack and take steps to mitigate it. B is a close second. A pen test can be timely and expensive though. Also, a system pen test may not always be effective in finding vulnerabilities that have already been exploited. If an attacker has already exploited the vulnerability, they may have found a way to hide their activity from a pen test.
upvoted 1 times
FoxTrotDG
2 years, 1 month ago
Idk. I go back and forth between B and C. We're not concerned with whether or not the vulnerability within the company's network/systems has been exploited, only whether or not the company is actually vulnerable.
upvoted 2 times
...
...
ito4862
2 years, 4 months ago
Selected Answer: A
Actually my previous answer was wrong: this seems like the right answer. Hypothesis-driven investigations are often triggered by a new threat that’s been identified through a large pool of crowdsourced attack data, giving insights into attackers’ latest tactics, techniques, and procedures (TTP). Once a new TTP has been identified, threat hunters will then look to discover if the attacker’s specific behaviors are found in their own environment. https://www.crowdstrike.com/cybersecurity-101/threat-hunting/
upvoted 1 times
...
ito4862
2 years, 4 months ago
Selected Answer: D
Would this not be using the Cyber Kill Chain? The question mentions a group using a specific vulnerability. From the website: The seven steps of the Cyber Kill Chain® enhance visibility into an attack and enrich an analyst’s understanding of an adversary’s tactics, techniques and procedures. Threat hunting means they are looking for adversaries already in the system and a system penetration seems to be overkill when you know the actual exploit.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago