exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 158 discussion

Actual exam question from CompTIA's CS0-002
Question #: 158
Topic #: 1
[All CS0-002 Questions]

A company offers a hardware security appliance to customers that provides remote administration of a device on the customer's network. Customers are not authorized to alter the configuration. The company deployed a software process to manage unauthorized changes to the appliance, log them, and forward them to a central repository for evaluation. Which of the following processes is the company using to ensure the appliance is not altered from its original configured state?

  • A. CI/CD
  • B. Software assurance
  • C. Anti-tamper
  • D. Change management
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
thenewpcgamer
Highly Voted 2 years, 2 months ago
Selected Answer: C
Definition: Anti-Tamper is the systems engineering activities intended to deter and/or delay exploitation of critical technologies in a system in order to impede countermeasure development, unintended technology transfer, or alteration of a system. Guys change management is a process to get changes approved by management before implementing changes. It is not a software that is deployed on a system to detect unauthorized changes. This is also referring to a 3rd party company which likely wouldnt be involved in the companys change management process. Its a third part company that wants to know if someone is tampering/making changes to their device.
upvoted 9 times
...
PTcruiser
Highly Voted 2 years, 9 months ago
Selected Answer: D
Key part "The company deployed a software process to manage unauthorized changes to the appliance, log them, and forward them to a central repository for evaluation" change management - process through which changes to the configuration of information systems are monitored and controlled. Each individual component should have a separate document or database record that describes its initial state and subsequent changes Anti-Tamper o Methods that make it difficult for an attacker to alter the authorized execution of software o Anti-tamper mechanisms include a field programmable gate array (FPGA) and a physically unclonable function (PUF)
upvoted 5 times
thenewpcgamer
2 years, 2 months ago
Change Management itself is not a software process. A software could be used to assist with change management documentation.
upvoted 2 times
...
...
RobV
Most Recent 1 year, 6 months ago
Selected Answer: C
C. Anti-tamper
upvoted 1 times
...
kmordalv
1 year, 7 months ago
Selected Answer: C
CompTIA is known for mixing issues to create confusion. Change management does not prevent disruption, therefore, the response sought is anti-tamper.
upvoted 1 times
...
Bayoneh
1 year, 7 months ago
The process described aligns with the principles of change management, and it is a measure to ensure that unauthorized changes to the hardware security appliance are detected and addressed. Therefore, the most appropriate answer is: D. Change management In this context, the company is managing changes to the appliance's configuration by deploying a software process to detect and log unauthorized changes, forwarding them to a central repository for evaluation. This process is in line with change management practices, which involve controlling and monitoring changes to maintain the integrity and security of a system. While "anti-tamper" (Option C) could also be a valid term, in the context of IT and security, processes that prevent or detect unauthorized changes are often considered part of change management practices. - GPT
upvoted 1 times
...
Pavel019846457
1 year, 8 months ago
Selected Answer: C
Anti-tamper measures are designed to detect and prevent unauthorized changes or tampering with a system or device.
upvoted 1 times
...
uday1985
1 year, 9 months ago
How Anti-tampering will limit internal unauthorized changes.? change management ensure its authorized before its processed.
upvoted 1 times
...
kyky
2 years ago
Selected Answer: C
The company has implemented a software process to manage unauthorized changes to the appliance, log them, and forward them to a central repository for evaluation. This process is designed to detect and prevent any tampering or unauthorized modifications to the appliance's configuration. Anti-tamper measures are commonly employed to protect the integrity and security of hardware devices, ensuring that they remain in their intended state
upvoted 3 times
heinzelrumpel
1 year, 11 months ago
Sorry, you are completetly wrong. The procedure clearly describes Change Management. The device can be tampered with easily according to the description in the text. Change Management will detect it and is able to reverse.
upvoted 1 times
...
...
boletri
2 years, 3 months ago
Selected Answer: D
Key here is "for evaluation".
upvoted 2 times
2Fish
2 years, 3 months ago
Agree. I mulled this one over in Jason Dions course, and D seems to be the best answer here. "Process" and "Evaluation"
upvoted 1 times
...
...
prntscrn23
2 years, 7 months ago
Selected Answer: D
It is asking for the process not the actual fix of the issue.
upvoted 2 times
...
R00ted
2 years, 8 months ago
Selected Answer: C
Anti-tamper protection comes in many varieties from mechanical means like anti-tamper screws and holographic stickers to electronic detection methods. Tamper-proofing microprocessors often takes the form of encasing electronics or otherwise securing them, while attackers use techniques like physically probing or modifying them, freezing devices, and applying out-of-spec power or signals.
upvoted 2 times
Adrian831
2 years, 8 months ago
anti-tamper it's more like a method/mechanism, not a process. The question ask for a process.
upvoted 3 times
R00ted
2 years, 8 months ago
Great point. I am changing my answer to D
upvoted 4 times
...
skibby16
1 year, 9 months ago
Wrong Anti Tamper is the correct answer
upvoted 1 times
...
...
...
Treymb6
2 years, 9 months ago
Selected Answer: D
I originally wanted to pick anti-tamper but it specifically asked for a "process". I'm going with D.
upvoted 3 times
...
amateurguy
2 years, 9 months ago
Selected Answer: D
its change management - D
upvoted 1 times
amateurguy
2 years, 9 months ago
Change management is the only one where you have to request approval / validation of changes before they go through like the question asks. Anti tamper is incorrect. Answer is D - Change management.
upvoted 2 times
...
...
bigerblue2002
2 years, 9 months ago
I get anti tamper, but would that not stop the tampering. This is software that is recording unauthorized alterations, thus the changes are being made. This really looks like D to me. If you are going to use anti-tamper then why let the tampering occur and simply record it? From a .gov site, Anti-tamper is defined as, Systems engineering activities intended to deter and/or delay exploitation of critical technologies in a U.S. defense system in order to impede countermeasure development, unintended technology transfer, or alteration of a system. I still don't see that as what is happening here. Going D I guess.
upvoted 1 times
...
Cizzla7049
2 years, 9 months ago
Selected Answer: C
Anti tamper. Google it, same as question
upvoted 1 times
...
adamhoms
2 years, 9 months ago
The change request management process in systems engineering is the process of requesting, determining attainability, planning, implementing, and evaluating of changes to a system. Its main goals are to support the processing and traceability of changes to an interconnected set of factors.
upvoted 1 times
...
cyberseckid
2 years, 9 months ago
going with D only because it says process , and I think anti tamper is not a process
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...