exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 69 discussion

Actual exam question from CompTIA's CS0-002
Question #: 69
Topic #: 1
[All CS0-002 Questions]

A developer downloaded and attempted to install a file transfer application in which the installation package is bundled with adware. The next-generation antivirus software prevented the file from executing, but it did not remove the file from the device. Over the next few days, more developers tried to download and execute the offending file. Which of the following changes should be made to the security tools to BEST remedy the issue?

  • A. Blacklist the hash in the next-generation antivirus system.
  • B. Manually delete the file from each of the workstations.
  • C. Remove administrative rights from all developer workstations.
  • D. Block the download of the file via the web proxy.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MortG7
Highly Voted 2 years, 10 months ago
Laudy, you never explain the reasoning behind any of your answers. I am beginning to have this nasty feeling that you are here simply to throw people off.
upvoted 24 times
...
TKW36
Highly Voted 2 years, 7 months ago
Selected Answer: D
I'm choosing D. In the question it states that the anti-virus is already preventing the file from executing, but it did not remove the file from the device. Later, more developers tried to DOWNLOAD and execute the same file. If the anti-virus is already preventing the execution of the file, then the real issue is the downloading of the file. By blocking the download, you can prevent anyone else from downloading that file while the AV is already preventing the execution of it. Unless by "blacklist" they also mean automatic deletion of said file when discovered and/or prevent it from being downloaded too. Very confusing question that's not written well...
upvoted 21 times
...
Anie_diogo28
Most Recent 11 months, 2 weeks ago
I choose A. The reason is that the question is still asking about what would be done to the tool "The next generation Anti-virus solution" It did ask what other solutions can be used.
upvoted 1 times
...
zecomeia_007
1 year ago
Selected Answer: A
By blacklisting the hash, the organization can effectively prevent the adware from spreading and compromising more systems.
upvoted 2 times
Lilik
1 year ago
what if they upgrade the version of the malware file and you download from the same web a different file with a different hash. what is your NSFW doing?
upvoted 2 times
...
...
RobV
1 year, 7 months ago
Selected Answer: D
D. Block the download of the file via the web proxy. Explanation: Blacklisting the hash in the next-generation antivirus system (Option A): - While blacklisting the hash could prevent the specific file from executing, it may not be a foolproof solution, as attackers can easily modify the file to generate a new hash. Blocking the download of the file via the web proxy (Option D): - This is the most proactive and effective solution. By blocking the download at the web proxy level, you prevent the file from reaching the developer workstations in the first place. This approach stops the problem at its source and helps protect all workstations from potential harm. Therefore, option D is the best choice in this scenario.
upvoted 2 times
...
novolyus
1 year, 8 months ago
Selected Answer: C
Why nobody said C? A developer should not have administrative rights in the machine he is working with. Privilege management: "The principle of least privilege states that an individual should only have the minimum set of privileges necessary to complete their assigned job duties."
upvoted 1 times
zhuzhu123
1 year, 8 months ago
Your would be right in some environments about the least privileges, but devs almost always need very specialized software and dev components that require high privileges. Therefore "..the minimum set of privileges..." are most likely local admin rights (restricted domain + local admin) in my opinion.
upvoted 1 times
...
...
sirpetey
1 year, 9 months ago
Selected Answer: A
Going with A and not D because it doesn't mention that they are downloading it from a website.
upvoted 2 times
...
Big_Dre
1 year, 11 months ago
Selected Answer: A
A is the best option since blacklisting the app give it no chance of being downloaded at all.
upvoted 2 times
...
kmordalv
1 year, 11 months ago
Selected Answer: D
The most correct option is D. If at some point the application is updated, the hash will be different, so it will be useless to check the hash in the next-generation antivirus system. Some people choose option A to prevent installation via USB but do not take into account that if the hash is changed, this option will be invalidated. Therefore, the most correct option is D
upvoted 2 times
...
Rori791
2 years, 1 month ago
Selected Answer: A
Why D? the web browser will inspect and block any attempts to access the blocked URL or stop the attempt of downloading the malicious file. So what if the developers accessed another URL and download the same file, will the web browser prevent this? A is better because the hash itself will be blocked an any attempts to download the file from other websites or other means (aka usb or email) will be detected and stopped… so A is more comprehensive approach
upvoted 3 times
Rori791
2 years, 1 month ago
+ The question didn’t mention whether the file was downloaded and executed from a USB drive or other means outside of a web browser, so D would not be effective in preventing the file from being executed.
upvoted 1 times
...
...
nomad421
2 years, 2 months ago
Selected Answer: A
When I blacklist a file in Cisco Secure Endpoint, it automatically deletes it when someone attempts to download it.
upvoted 4 times
HotWings8
2 years, 1 month ago
Comptia is vendor neutral so they shouldn't be specific with certain brand names, for that I'm going with D
upvoted 1 times
...
...
kiduuu
2 years, 4 months ago
Selected Answer: A
Blacklist the hash in the next-generation antivirus system would be the BEST approach to remedy the issue. Since the next-generation antivirus software prevented the file from executing but did not remove it from the device, blacklisting the hash in the antivirus system would prevent the file from executing on any workstation in the future, even if a user tries to download it again.
upvoted 3 times
...
khrid4
2 years, 4 months ago
Selected Answer: A
A. -Can retroactively delete all existing hashes from existing computers -Immediately detects future download Hits two birds in one stone compared to D. which shows A is better (question is asking for the Best)
upvoted 3 times
...
Stiobhan
2 years, 5 months ago
Selected Answer: A
You know there is a reason why they keep mentioning NGAV!!! Please read this through. https://www.carleton.edu/its/newsletter/news/malwarebytes-next-generation-antivirus/?issue=cybersecurity-2022
upvoted 2 times
...
2Fish
2 years, 5 months ago
Selected Answer: D
D. We are trying to mitigate the download. The current AV is already detecting, just not removing. Blacklisting HASHs would not be as efficient as the AV is already detecting it.
upvoted 3 times
2Fish
2 years, 4 months ago
man.. now I am rethinking, from Stiobhan's post. I can see NGAV being a solution, I wonder though, can you blacklist it yourself or does it require a support ticket with the vendor. For instance in malwarebytes, we do see blocks for downloads and executions "IF" MWB has the hashs already. Otherwise, we would have to open a support ticket for them to add the hash. ugh.
upvoted 2 times
...
...
encxorblood
2 years, 5 months ago
Selected Answer: A
Answer is A - Blocking the download of the file via the web proxy (option D) is also a useful security measure, but it may not be sufficient to prevent the file from being downloaded and executed through other means, such as USB drives or email attachments.
upvoted 4 times
...
CyberNoob404
2 years, 7 months ago
Selected Answer: D
The proxy will prevent it from being downloaded.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...