Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CS0-002 topic 1 question 8 discussion

Actual exam question from CompTIA's CS0-002
Question #: 8
Topic #: 1
[All CS0-002 Questions]

An analyst receives artifacts from a recent intrusion and is able to pull a domain, IP address, email address, and software version. Which of the following points of the Diamond Model of Intrusion Analysis does this intelligence represent?

  • A. Infrastructure
  • B. Capabilities
  • C. Adversary
  • D. Victims
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
rivo3
Highly Voted 1 year, 1 month ago
Selected Answer: A
Per CompTIA, and makers of Diamond Model(https://www.comptia.org/blog/think-like-a-hacker-3-cybersecurity-models-used-to-investigate-intrusions): Adversary: The persona of the individual or group attacking you Infrastructure: IP addresses, domain names or email addresses Capabilities: What the adversary can do (e.g., malware, exploits, manipulate infrastructure) Victim: Can include people, services, network assets or information
upvoted 25 times
...
nelombg
Most Recent 4 months, 1 week ago
C=Infrastructure The infrastructure includes the physical or logical communication structures such as IP or e-mail addresses, domain names, and others, employed by an adversary to deliver a capability.
upvoted 1 times
...
581777a
6 months ago
Selected Answer: C
The information about the domain, IP address, email address, and software version represents the "Infrastructure" point of the Diamond Model of Intrusion Analysis. So the correct answer is: A. Infrastructure
upvoted 2 times
581777a
6 months ago
oops I meant A
upvoted 1 times
...
...
Kwame25
8 months, 2 weeks ago
Selected Answer: A
infrastructure includes the physical or logical communication structures such as IP or e-mail addresses, domain names, and others, employed by an adversary to deliver a capability. cyware website gives clear definition.
upvoted 1 times
...
Kwame25
8 months, 2 weeks ago
Selected Answer:A
upvoted 1 times
...
Kainas
1 year ago
Selected Answer: A
Chatgpt went with A as the correct answer. When asked why it picked A over C, this is what it said... The domain, IP address, email address, and software version are all part of the infrastructure that the adversary used to carry out the intrusion. Therefore, this intelligence would represent the "Infrastructure" point in the Diamond Model of Intrusion Analysis, which is why option A is the correct answer. The "Adversary" point in the Diamond Model would represent information about the identity, motivations, and tactics of the attackers themselves, which is not directly represented by the artifacts listed in the question.
upvoted 4 times
...
Snkrsnaker1
1 year ago
Answer is C. I think you guys are making this question harder than it is supposed to be. In the Diamond Model of Intrusion Analysis, it talks about analytical pivoting, meaning IP address, domain name, and email address can also be the victim, it all depends on where in the diamond you are coming from. In this case, we are the analyst and all we have is an IP address, an email address, and software version. This would point to the Adversary responsible for the recent intrusion. There is no way you can tell what the infrastructure is based on just an IP, email address, and software version. That's how I am approaching this question.
upvoted 3 times
...
OnA_Mule
1 year, 1 month ago
Selected Answer: C
The key to this question is how you interpret the first 8 words of the sentence, "An analyst receives artifacts from a recent Intrusion." If you believe that these artifacts are from the local system, then the answer would be A. In this context, artifacts would be referring to the breadcrumb trail left behind by the attacker. So that would make the correct answer C as this information would belong to the Adversary
upvoted 4 times
...
2Fish
1 year, 1 month ago
Selected Answer: A
A. Per Jason Dion CYSA Udemy class.
upvoted 1 times
...
kiduuu
1 year, 1 month ago
Selected Answer: A
Infrastructure The information provided in the question, such as domain, IP address, email address, and software version, falls under the "Infrastructure" point of the Diamond Model of Intrusion Analysis. This information can be used to identify the infrastructure that the adversary used during the intrusion, including the tools, networks, and systems that were compromised. By analyzing the infrastructure, analysts can identify the tactics, techniques, and procedures (TTPs) used by the adversary and create a better understanding of the overall intrusion.
upvoted 1 times
...
boletri
1 year, 1 month ago
Selected Answer: C
Answer is C. Official Comptia Cysa+ Course Material Diagram of Diamond Model. Can t submit the Image here because is not support.
upvoted 1 times
...
encxorblood
1 year, 2 months ago
Selected Answer: C
The BEST approach for the consultant to consider when modeling the client's attack surface would be to answer the question: "What are the most likely attack vectors for this particular client?" Option C is the best approach for the consultant to take, as it involves analyzing attacks against similar industry peers and assessing the probability of the same attacks happening. This approach would help the consultant to identify the most likely attack vectors and prioritize their attention on those areas. Option A is helpful in understanding external scans, but may not give the full picture of the client's attack surface. Option B is focused on potential solutions to reduce the likelihood of an attack, but it does not provide insight into the specific risks that the client may be facing. Option D is focused on funding for solutions, which may not be the primary concern at this stage.
upvoted 1 times
...
omer123456
1 year, 3 months ago
Selected Answer: A
Correct answer is A The infrastructure includes the physical or logical communication structures such as IP or e-mail addresses, domain names, and others, employed by an adversary to deliver a capability.
upvoted 1 times
...
omer123456
1 year, 3 months ago
Correct answer is A The infrastructure includes the physical or logical communication structures such as IP or e-mail addresses, domain names, and others, employed by an adversary to deliver a capability.
upvoted 1 times
...
CyberNoob404
1 year, 3 months ago
Selected Answer: A
Google DIAMOND Model and you will see A is the answer.
upvoted 2 times
...
iraidesc
1 year, 4 months ago
Selected Answer: C
https://teamt5.org/en/posts/what-is-diamond-model-of-intrusion-analysis/
upvoted 1 times
...
MrRobotJ
1 year, 5 months ago
A: Infra https://cyware.com/educational-guides/incident-response/what-is-the-diamond-model-of-intrusion-analysis-5f02
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...