A security analyst is working on a project to implement a solution that monitors network communications and provides alerts when abnormal behavior is detected. Which of the following is the security analyst MOST likely implementing?
A.
Vulnerability scans
B.
User behavior analysis
C.
Security orchestration, automation, and response
Not 100% sure but i will go with B. User behavior Analysis.
Reason: As per Comptia objectives, User behavior Analysis comes under SIEM. Well as the Question asks whats most likely the solution being implemented hence User behavior analysis seems to be the direct answer. SOAR simply means you are adding automation and servers handle the security tasks automatically and take action. happy to discuss. Some of the question are to confuse so i ll stick to most direct connection in this case. B
Correct Answer
B. User Behavior Analysis
The security analyst is most likely implementing a User Behavior Analysis (UBA) solution. UBA monitors network communications and provides alerts when it detects abnormal behavior, such as unusual login times, atypical data access patterns, or other deviations from established user behavior baselines. This helps identify potential security incidents such as compromised accounts or insider threats.
User behavior analysis involves monitoring and analyzing network communications and user activities to identify abnormal or suspicious behavior. When anomalies are detected, alerts are generated to notify security personnel. This approach helps in identifying potential security threats, insider threats, and other irregular activities within the network.
The security analyst is most likely implementing user behavior analysis as part of a security solution that monitors network communications and provides alerts when abnormal behavior is detected. User behavior analysis (UBA) is a cybersecurity technique that focuses on monitoring and analyzing the behavior of users and entities within a network to detect anomalies or suspicious activities. UBA solutions use machine learning and behavioral modeling to establish a baseline of normal user behavior and then identify deviations from that baseline.
While security orchestration, automation, and response (SOAR) (Option C) can be used to automate incident response processes, it is not primarily focused on monitoring network communications and detecting abnormal behavior.
initially I thought it was SOAR but as I read this now I am believing it is B. User behavior analysis as it does not detect anomalies in behavior. SOAR is low level/signature based
https://www.technology.org/2019/04/30/siem-ueba-and-soar-whats-the-difference/
SOAR technologies meet the need for a missing component of SIEM tools, which is the ability to take action against malicious activity. SIEM tools can flag suspicious behavior, however, problems such as false positives and incident prioritization can deter from their proper use.
SOAR tools allow for automated responses to low-level incidents and correct incident prioritization. Because of their ability to orchestrate information from many different sources, SOAR systems also provide a greater level of efficiency and effectiveness to an organization’s information security defenses.
BA would be right answer as here directly nothing to do with automation or orchestration. The configurations of various Behavior analysis settings will helps SIEM to detect anomalies and alert based on that.
I'm going to go with B. ChatGPT keeps switching between B and C.
User behavior analysis involves monitoring and analyzing network communications to identify abnormal behavior or patterns that may indicate a security threat. It helps in detecting suspicious activities, such as unusual login patterns, data access attempts, or unauthorized network access, and raises alerts to security analysts for further investigation.
Why C is apparently wrong:
C. Security orchestration, automation, and response (SOAR) involves automating incident response processes, but it is not directly related to monitoring network communications for abnormal behavior.
User behavior analysis involves monitoring and analyzing network communications, user activities, and system behavior to identify patterns and anomalies. By analyzing user behavior, such as login patterns, access patterns, data transfer activities, and other network interactions, abnormal behavior can be detected. This can help identify potential security incidents, unauthorized access, insider threats, and other suspicious activities.
Implementing a solution that monitors network communications and provides alerts for abnormal behavior aligns with the goals of user behavior analysis. It helps enhance the organization's security posture by detecting and responding to potential security incidents in real-time.
"SIEMS are systems built to apply rules to sets of data with respect to specific patterns. Traditionally this meant network- and server-type events, failures, and other conditions that alerted an operator that the system was not responding in a normal manner...Advances in user behavioral analysis has provided another interesting use of the SIEM: monitoring what people do with their systems and how they do it. If every day, upon beginning work, the
accountants start the same programs, then when an accountant account logs in and does something totally different, like accesses a system they have never accessed before, this indicates a behavioral change worth looking into."
Comptia Security+ Exam Guide Sixth Edition SY0-601 by Conklin et al.
SOAR on the other hand is automated with playbooks, not what this question is asking about.
The security analyst is MOST likely implementing option B, user behavior analysis. User behavior analysis is a type of security solution that uses machine learning and artificial intelligence to monitor network communications and identify abnormal behavior that may indicate a security threat. By analyzing patterns in user behavior, the solution can detect anomalies and generate alerts for further investigation by security personnel. This type of solution is commonly used in network security operations centers (SOCs) to enhance threat detection capabilities and reduce the time it takes to detect and respond to security incidents. Options A, C, and D are different types of security solutions that may also be implemented by security analysts, but they are not specifically related to monitoring network communications for abnormal behavior.
The security analyst is most likely implementing a User Behavior Analysis (UBA) solution, which uses machine learning and statistical analysis techniques to monitor network traffic and detect abnormal user activity that deviates from the normal behavior of users in the network. UBA solutions can identify threats such as insider threats, compromised user accounts, and malware infections that might be missed by traditional security controls like firewalls and antivirus software. The solution will generate alerts when it detects abnormal behavior, which can be used to trigger further investigation by the security team.
The security analyst is most likely implementing a user behavior analysis solution, which monitors network communications and provides alerts when abnormal behavior is detected. Answer: B. User behavior analysis.
User behavior analysis (UBA) is a type of security solution that monitors network communications and user activities to detect abnormal behavior and potential threats. UBA solutions use machine learning and artificial intelligence algorithms to establish a baseline of normal user behavior and identify deviations from this baseline that could indicate potential security threats.
Vulnerability scans, security orchestration, automation, and response (SOAR), and threat hunting are different types of security solutions that are not directly related to monitoring network communications and detecting abnormal behavior.
Vulnerability scans are automated tools that identify vulnerabilities and weaknesses in a system or network. SOAR solutions automate incident response and security operations workflows to increase efficiency and reduce response time. Threat hunting involves actively searching for threats and vulnerabilities that may not be detected by traditional security solutions.
Therefore, the security analyst is most likely implementing user behavior analysis to monitor network communications and detect abnormal behavior.
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Nirmalabhi
Highly Voted 2 years, 6 months agoAnonymousJhb
1 year, 3 months agoSepu
Highly Voted 2 years, 9 months agodeeden
2 years, 6 months agoawscody
1 year, 9 months agoSeanNemstar
Most Recent 1 year, 1 month agoRyanL26
1 year, 2 months agoThurams
1 year, 8 months agoCyberjerry
1 year, 8 months agoWANDOOCHOCO
1 year, 8 months agoTheFivePips
1 year, 8 months agoRevolutionaryAct
1 year, 10 months agosujon_london
1 year, 11 months agoProtract8593
1 year, 11 months agostreak007
1 year, 11 months agoApplebeesWaiter1122
2 years agoLeonardSnart
2 years, 1 month agoYawannawanka
2 years, 2 months agoarrowphoto7604493ahmed
2 years, 3 months agoMasterControlProgram
2 years, 3 months agoAhmed_aldouky
2 years, 3 months ago