exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 91 discussion

Actual exam question from CompTIA's CS0-002
Question #: 91
Topic #: 1
[All CS0-002 Questions]

The incident response team is working with a third-party forensic specialist to investigate the root cause of a recent intrusion. An analyst was asked to submit sensitive network design details for review. The forensic specialist recommended electronic delivery for efficiency, but email was not an approved communication channel to send network details. Which of the following BEST explains the importance of using a secure method of communication during incident response?

  • A. To prevent adversaries from intercepting response and recovery details
  • B. To ensure intellectual property remains on company servers
  • C. To have a backup plan in case email access is disabled
  • D. To ensure the management team has access to all the details that are being exchanged
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Laudy
Highly Voted 2 years, 11 months ago
Disagree. I think this is "A. To prevent adversaries from intercepting response and recovery details"
upvoted 14 times
TheSkyMan
2 years, 11 months ago
I'm with you on that. A is the best answer.
upvoted 2 times
...
...
FEITH
Most Recent 11 months, 2 weeks ago
Definetly A !
upvoted 1 times
...
Gwatto
1 year, 9 months ago
Selected Answer: A
Option B isn't completely ruled out but in the case of "Secure method of communication" b has nothing to do with that.
upvoted 1 times
...
Big_Dre
1 year, 11 months ago
Selected Answer: A
i think A is the bet option
upvoted 1 times
...
JoInn
2 years, 4 months ago
Selected Answer: B
The reason why B is the correct one in this case is because we are not referring to general best practice. It specifically mentions that the data they have been asked to submit is sensitive network design details, so it has nothing to do with the way they are conducting incident response. The end of this question should have said BEST in this scenario, but it only implies it without specifying. So it's B.
upvoted 1 times
alayeluwa
2 years, 4 months ago
Nah foo
upvoted 4 times
...
...
2Fish
2 years, 5 months ago
Selected Answer: A
A. Absolutely, credt to boletri, A secure method of communication between the members of the CSIRT is essential for managing incidents successfully. The team may require "out-of-band" or "off-band" channels that cannot be intercepted. In a major intrusion incident, using corporate email or VoIP runs the risk that the adversary will be able to intercept communications. Official Comptia Cysa+ Course Material
upvoted 3 times
...
boletri
2 years, 5 months ago
Selected Answer: A
A secure method of communication between the members of the CSIRT is essential for managing incidents successfully. The team may require "out-of-band" or "off-band" channels that cannot be intercepted. In a major intrusion incident, using corporate email or VoIP runs the risk that the adversary will be able to intercept communications. Official Comptia Cysa+ Course Material
upvoted 3 times
...
Cock
2 years, 6 months ago
It's important to use a secure method of communication during incident response to prevent adversaries from intercepting response and recovery details. In this case, email is not an approved communication channel, which means that it may not be secure and could potentially be intercepted by malicious actors. Using a secure method of communication, such as an encrypted file transfer protocol or a virtual private network (VPN), will help to ensure that sensitive information, such as network design details, remains confidential and is not intercepted by unauthorized individuals. The other options listed are not the primary reasons for using a secure method of communication during incident response. However, ensuring intellectual property remains on company servers and having a backup plan in case email access is disabled are important considerations for protecting sensitive information. Having management access to all details being exchanged is also important, but is not directly related to the security of the communication itself.
upvoted 2 times
...
absabs
2 years, 6 months ago
Selected Answer: A
Guys focus on "during incident response", so i going with A.
upvoted 1 times
...
CatoFong
2 years, 6 months ago
Selected Answer: A
Correct answer is A
upvoted 1 times
...
Abyad
2 years, 9 months ago
Selected Answer: A
A is explaining the importance to use secure methods
upvoted 2 times
...
KingDeeko
2 years, 9 months ago
Selected Answer: B
Industrial designs can be protected through various forms of intellectual property (IP), including patents, trademarks, copyrights, and/or standalone design systems. if that email gets intercepted then the threat now has the design of the network at their disposal.
upvoted 1 times
...
bigerblue2002
2 years, 10 months ago
Any rational as every other place that has, has the given answer as correct?
upvoted 1 times
TheSkyMan
2 years, 10 months ago
"It is important to remember that in the event of a network compromise, unauthorized parties are likely to be monitoring—and attempting to counteract—your efforts. Encrypted, out-of-band communications can protect your IR activities from prying eyes" https://wickr.com/using-out-of-band-communication-to-bolster-incident-response/
upvoted 1 times
...
...
Abyad
2 years, 11 months ago
Selected Answer: A
I think the correct answer is A
upvoted 1 times
...
shocker111
2 years, 11 months ago
Selected Answer: A
I think it is A, sounds correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...