exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 113 discussion

Actual exam question from CompTIA's CS0-002
Question #: 113
Topic #: 1
[All CS0-002 Questions]

A security analyst is investigating an incident related to an alert from the threat detection platform on a host (10.0.1.25) in a staging environment that could be running a cryptomining tool because it is sending traffic to an IP address that is related to Bitcoin.
The network rules for the instance are the following:

Which of the following is the BEST way to isolate and triage the host?

  • A. Remove rules 1, 2, and 3.
  • B. Remove rules 1, 2, 4, and 5.
  • C. Remove rules 1, 2, 3, 4, and 5.
  • D. Remove rules 1. 2, and 5.
  • E. Remove rules 1, 4, and 5.
  • F. Remove rules 4 and 5.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
TheSkyMan
Highly Voted 2 years, 9 months ago
Selected Answer: D
I'll go with D. For a staging server, I'd want to deny all external connections; which are rules 1, 2, and 5. Lines 3 and 4 allow SSH and DNS connectivity from only the internal network.
upvoted 10 times
2Fish
2 years, 3 months ago
Agree. I am thinking stop those inbound and outbound "any" connections. Those that are saying it says "sending" is the key word. You can still send both ways using a tcp shell and tcp reverse shell.
upvoted 1 times
...
...
Laudy
Highly Voted 2 years, 10 months ago
This question is dumb...
upvoted 9 times
cyberseckid
2 years, 9 months ago
yes , it docent even say allow or deny , imo don't waste your time
upvoted 1 times
...
...
skibby16
Most Recent 1 year, 7 months ago
Selected Answer: C
The best way to isolate and triage the host is to remove rules 1, 2, 3, 4, and 5. These rules allow inbound and outbound traffic on ports 22 (SSH), 80 (HTTP), and 443 (HTTPS) from any source or destination. By removing these rules, the security analyst can block any network communication to or from the host, preventing any further data exfiltration or malware infection. This will also allow the security analyst to perform a forensic analysis on the host without any interference from external sources.
upvoted 1 times
...
skibby16
1 year, 10 months ago
What is DNS crypto mining? While many threats were analyzed, the report found cryptomining generated the most malicious DNS traffic out of any individual category. When placed inside victims' environments, cryptomining malware abuses computing resources to mine for digital currencies like bitcoin, which can be profitable to threat actors.
upvoted 1 times
...
nomad421
2 years ago
Selected Answer: D
D is the best answer. Honestly, I would have only removed the last rule if possible.
upvoted 1 times
...
Dutch012
2 years ago
What ?
upvoted 1 times
...
CatoFong
2 years, 4 months ago
Selected Answer: F
Read the question. 10.0.1.25 is SENDING traffic to a BTC related ip... Correct ans is F.
upvoted 1 times
AaronS1990
2 years, 4 months ago
How do you suppose it was sending in the first place, an inbound connection too
upvoted 2 times
...
...
CyberNoob404
2 years, 5 months ago
Selected Answer: D
This will block incoming/outgoing.
upvoted 1 times
...
SolventCourseisSCAM
2 years, 8 months ago
Selected Answer: D
It says isolating staging environment from external network. You need to remove http and https, but you need to keep ssh and dns because it is used in internal network for the staging environement.
upvoted 2 times
...
ThisGuyStillLearning
2 years, 9 months ago
Correct me if I'm wrong, doesn't isolate means "completely alone"? So, how about C?
upvoted 1 times
Mr_BuCk3th34D
2 years, 6 months ago
You will definitely isolate the machine if you choose to remove all rules, but that includes yourself. In order to isolate the machine from the rest of the network, but still allows you, as an administrator, to triage/analyze the machine, you still need SSH connectivity. Not sure about DNS though, I think only SSH would be enough for isolation and analysis.
upvoted 1 times
...
...
amateurguy
2 years, 9 months ago
Selected Answer: E
You dont want 4 and 5 but you also dont want insecure http traffic in any direction. Im going with E.
upvoted 1 times
...
piotr3439
2 years, 9 months ago
Selected Answer: F
Block dns and any outbound TCP. I now understnad the question
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...