exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 29 discussion

Actual exam question from CompTIA's CS0-002
Question #: 29
Topic #: 1
[All CS0-002 Questions]

A company is experiencing a malware attack within its network. A security engineer notices many of the impacted assets are connecting outbound to a number of remote destinations and exfiltrating data. The security engineer also sees that deployed, up-to-date antivirus signatures are ineffective. Which of the following is the BEST approach to prevent any impact to the company from similar attacks in the future?

  • A. IDS signatures
  • B. Data loss prevention
  • C. Port security
  • D. Sinkholing
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
fuzzyguzzy
5 months ago
Selected Answer: B
Sinkholing is a reactive measure not a preventative measure. The answer that is reactive and will detect exfiltrated data is B
upvoted 1 times
...
sireyml
1 year, 1 month ago
I would go with dlp,no signature,so we may be looking at a zero day exploit,ip is probably not linked to any malicious group so sinkhole might fail if data exfiltration is not noticed by analysts but dlp involves protecting data at rest, in transit.
upvoted 2 times
...
skibby16
1 year, 5 months ago
Selected Answer: D
Sinkholing can help prevent any impact to the company from similar attacks in the future by redirecting the malicious traffic from the compromised assets to a sinkhole server, where it can be monitored, analyzed, or blocked. Sinkholing can also prevent the compromised assets from communicating with their command and control servers or exfiltrating data to remote destinations
upvoted 1 times
...
Sebatian20
1 year, 5 months ago
Selected Answer: D
Sink hole. Stop the Malware at it's source and you won't need to worry about DLP.
upvoted 1 times
...
dickchappy
1 year, 5 months ago
Selected Answer: D
Straight from the official study guide: "Black holes and sinkholes can be configured using routing policies, but you can also use DNS-based sinkholing to capture malicious traffic trying to exit from your network." This is about malicious traffic exiting your network. DLP is more tailored toward dealing with insider threats, not malware attacks. Another source: https://www.egress.com/blog/data-loss-prevention/five-tips-prevent-exfiltration#:~:text=Sinkholing%20is%20a%20network%20engineering,exfiltration%20from%20doing%20any%20harm. "Sinkholing is a network engineering technique where you redirect traffic from a malicious program to an IP address of your choosing. This technique means you can see exactly what the malware program is attempting to exfiltrate while preventing the exfiltration from doing any harm. You can then study the malware at your leisure to understand how it got there and mitigate future attempts."
upvoted 1 times
...
Chilaqui1es
1 year, 6 months ago
Im going to DLP as the answer because from a google search "can dlp work against cyber attacks?" Multiple sources say "Companies that use DLP have a security strategy to detect, prevent data loss, and cyber-attacks. DLP is also used to eliminate unwanted data that will harm the system's security." I looked into Sinkholes and I just feel sketchy about it. Maybe or maybe but I think its unlikely. A big reason too I am going with DLP a lot people who passed the test went with this answer as well.
upvoted 2 times
...
chaddman
1 year, 6 months ago
The best approach to prevent any impact from similar attacks in the future is "D. Sinkholing." A sinkhole redirects traffic from the infected machines to a trusted server, effectively isolating them and preventing data exfiltration to malicious destinations. This can be especially useful when traditional antivirus measures are proving ineffective, as it can stop the communication between the malware and its command and control servers.chatgpt
upvoted 1 times
...
skibby16
1 year, 6 months ago
Selected Answer: D
Sinkholing is a technique for manipulating data flow in a network; you redirect traffic from its intended destination to the server of your choosing. It can be used maliciously, to steer legitimate traffic away from its intended recipient, but security professionals more commonly use sinkholing as a tool for research and reacting to attacks1 Sinkholing can help prevent any impact to the company from similar attacks in the future by redirecting the malicious traffic from the compromised assets to a sinkhole server, where it can be monitored, analyzed, or blocked. Sinkholing can also prevent the compromised assets from communicating with their command and control servers or exfiltrating data to remote destinations.
upvoted 1 times
...
MiDirtyTip
1 year, 8 months ago
Im choosing D, soley because its saying it sending resources to outbound sources whiich is why i would use sinkholing to prevent floss of information same as DLP but my opinion giving you more control on the sink hole server
upvoted 2 times
...
karpal
1 year, 10 months ago
Selected Answer: D
I went through all 405 questions. I am now reviewing the questions I got wrong and I am so puzzled by the comments and voting here. Is for SURE not DLP man. DLP prevents human exfiltration not exfil done by malware attacks (for example exfiltration would mean dns exfiltration - DLP has no way to detect this). I asked chatGPT and said also DLP. I told it :"DLP is useful to protect exfiltration done by humans not malware attacks. I think that IDS signatures is a method to do it(it will detect malware and then the analyst can stop it to happen) or Sinkhole the malicious IPs or domain names used in the malware attack. I do not think DLP is the answer here." Answer came back: You're correct, and I apologize for the incorrect response. In the context of preventing the impact of malware attacks and exfiltration, the more appropriate approach would be option D: Sinkholing. So the only active useful method from the options to really have an impact is the sinkhole for the remote destinations. I choose D.
upvoted 4 times
Aliyan
1 year, 8 months ago
I am also coming back to the questions and i was thinking why not sinkholing also because that was the answer i picked when i didnt look at the comments and answer key but after going back to my notes and talking to GPT a bit I think we are forgetting what the main reason for sinkholing is.. Sinkholing primarily focuses on redirecting malicious traffic to a controlled server for analysis or monitoring. It doesn't inherently prevent data exfiltration or address the root cause of the attack. It can be more effective for understanding the scope and scale of an attack or for gathering threat intelligence but may not directly prevent sensitive data from leaving the network. Sinkholing does not necessarily prevent this data transfer from occurring; it merely redirects the communication to a different location. Sinkholing may not have full control over the malware or its actions. Sophisticated malware can adapt and change its behavior, potentially evading sinkholing measures.
upvoted 1 times
...
...
kiduuu
2 years, 1 month ago
Selected Answer: B
The best approach to prevent any impact to the company from similar attacks in the future is to implement data loss prevention (DLP).
upvoted 2 times
...
2Fish
2 years, 2 months ago
Selected Answer: B
B. This is DLP for sure.
upvoted 2 times
...
timhk
2 years, 3 months ago
It says "prevent any impact to the company from similar attacks in the future?". That means the attack still exists in the future within the company. So to prevent any impact to the company is to use DLP.
upvoted 2 times
...
Kelz56
2 years, 6 months ago
Data loss prevention (DLP) is a set of technologies and processes that monitor and inspect data on a corporate network to prevent exfiltration of critical data as a result of cyberattacks, such a phishing or malicious insider threats.
upvoted 2 times
...
Study4America
2 years, 6 months ago
Selected Answer: B
Exfiltrating data is DLP no doubt
upvoted 3 times
...
TeyMe
2 years, 6 months ago
Selected Answer: D
Context: So devices are connecting to outbound remote destinations (C2), attack via malware, Since malware signatures couldnt be detected, this is Unknown Unknows so we can rule out A, Howvever, Malware analysis will reveal Source info and get IPs from that, then we can SinkHole with the hope of getting alerted!
upvoted 1 times
TeyMe
2 years, 6 months ago
Also, notice the "Prevent ""ANY"" impact, this means for both Malware and DLP, not just DLP.. contextually...
upvoted 1 times
...
...
MortG7
2 years, 6 months ago
Selected Answer: B
The little nugget here is "exfiltrating data" DLP
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago