exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 143 discussion

Actual exam question from CompTIA's CS0-002
Question #: 143
Topic #: 1
[All CS0-002 Questions]

A security analyst at example.com receives SIEM alert for an IDS signature and reviews the associated packet capture and TCP stream:
Packet capture:

TCP stream:

Which of the following actions should the security analyst take NEXT?

  • A. Review the known Apache vulnerabilities to determine if a compromise actually occurred.
  • B. Contact the application owner for connect.example.local for additional information.
  • C. Mark the alert as a false positive scan coming from an approved source.
  • D. Raise a request to the firewall team to block 203.0.113.15.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
talosDevbot
Highly Voted 2 years, 4 months ago
Selected Answer: B
I currently work in a SOC. Anytime we receive alerts/offenses that appears to be a potential scan (interna/external), we already verify with the app owner/client if this was expected activity. We never close a ticket without confirmation, even its from an approved source
upvoted 12 times
2Fish
2 years, 3 months ago
Agree. We need to confirm.
upvoted 1 times
...
...
m025
Most Recent 1 year, 3 months ago
Selected Answer: A
skibby16 answer
upvoted 1 times
...
skibby16
1 year, 6 months ago
Selected Answer: A
The security analyst should review the known Apache vulnerabilities to determine if a compromise actually occurred. The SIEM alert indicates that an IDS signature detected an attempt to exploit a vulnerability in Apache Struts 2 (CVE-2017-5638), which allows remote code execution via a crafted Content-Type header4. The packet capture and TCP stream show that the attacker sent a malicious request with a Content-Type header containing an OGNL expression that executes the command “whoami” on the target server. However, this does not necessarily mean that the attack was successful, as it depends on whether the target server was running a vulnerable version of Apache Struts 2 or not. Therefore, the security analyst should review the known Apache vulnerabilities and compare them with the version of Apache Struts 2 running on the server to confirm if a compromise actually occurred or not.
upvoted 2 times
...
Xoomalla
1 year, 10 months ago
Selected Answer: A
Should be A. user agent can be manipulated easily
upvoted 2 times
...
AaronS1990
2 years, 4 months ago
Selected Answer: B
I agree with Ian pretty much word for word. It looks like this is coming from the SOC but it has still triggered the IDS and so it is worth confirming before either blocking or dismissing.
upvoted 3 times
...
IanRogerStewart
2 years, 4 months ago
Selected Answer: B
WHile it might *look* like this is coming from the SOC, you haven't done your due diligence until you've confirmed with the source that this is legit.
upvoted 4 times
...
CatoFong
2 years, 4 months ago
Selected Answer: C
C. should be the unanimous answer. Read the TPC stream and you'll see that the SOC team is running an unauthenticated scan.
upvoted 1 times
...
ra774ra7
2 years, 5 months ago
can someone please explain how they got the answer? I am going to be honest, I have no clue!
upvoted 4 times
...
hanybee
2 years, 5 months ago
Selected Answer: B
An authenticated scan reports weaknesses exposed to the authenticated users of the system, as all the hosted services can be accessed with a right set of credentials. An -unauthenticated scan reports weaknesses from a public viewpoint (this is what the system looks like to the unauthenticated users) of the system. So the scan may be valid but instead of concluding asking for additional information from the application owner doesn't hurt and confirms if this activity is done internally.
upvoted 2 times
...
TKW36
2 years, 5 months ago
From the TCP stream, starting at the bottom, lines 4 and 5 give the answer. SOC team running an unauthenticated scan. Answer is C.
upvoted 4 times
Xoomalla
1 year, 10 months ago
User agent can be spoofed eaisly
upvoted 1 times
...
...
TIM0088
2 years, 6 months ago
Selected Answer: C
SOC team doing scan. MY ans. is C
upvoted 4 times
...
cmllsu
2 years, 6 months ago
Selected Answer: D
Tricky questions, not sure either but knowing the one that investigating this is SOC from exampledotcom, looks like it wants us to pick C. later part of the suspicious code is related to Apache Strut vulnerability. but IV info in the TCP stream indicate that it is coming from example.local. There should be a choice to validate the activity if it is part of pentest or vulscan but regardless if it is unauthorized scanning I would go with D. it is close for me with C & D but would choose D for this scenario.
upvoted 2 times
cmllsu
2 years, 6 months ago
check CVE-2017-5638 and for some reason the source IP in the question is tagged as internal in VT. so this is leaning more on the scanning that choice C is saying. I change my answer to C.
upvoted 1 times
...
...
Whoah
2 years, 7 months ago
Selected Answer: C
This appears to be an unauthenticated connection from SoC, the reverse proxy line shows the source as being from the same domain along with more containers showing SoC attributes. I'm calling this a false positive
upvoted 3 times
...
ryanzou
2 years, 8 months ago
Selected Answer: D
D makes sense for me
upvoted 1 times
...
[Removed]
2 years, 8 months ago
Selected Answer: D
This looks like and OGNL Injection attack to me. From what I've read seems like a WAF is best protection/mitigation for it so I'm going with D.
upvoted 1 times
...
Adrian831
2 years, 9 months ago
Selected Answer: D
D seems the right answer here.
upvoted 1 times
...
adamhoms
2 years, 9 months ago
I think D is the answer, I tried to understand the TCP stream and found out that the user is not authenticated, and this user trying to do many things seems unusal. so we must block it on the firewall.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...