exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 47 discussion

Actual exam question from CompTIA's CS0-002
Question #: 47
Topic #: 1
[All CS0-002 Questions]

During the forensic analysis of a compromised machine, a security analyst discovers some binaries that are exhibiting abnormal behaviors. After extracting the strings, the analyst finds unexpected content. Which of the following is the NEXT step the analyst should take?

  • A. Validate the binaries' hashes from a trusted source.
  • B. Use file integrity monitoring to validate the digital signature.
  • C. Run an antivirus against the binaries to check for malware.
  • D. Only allow whitelisted binaries to execute.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
R00ted
Highly Voted 2 years, 9 months ago
Selected Answer: A
I would check the hash against virustotal before doing anything else
upvoted 5 times
...
RobV
Most Recent 1 year, 6 months ago
Selected Answer: C
C. Run an antivirus against the binaries to check for malware.
upvoted 1 times
...
CCNPsec
1 year, 9 months ago
I see people leaning to C option but how would an analyst know that a machine is compromised??? they do already have AV in place that flagged the machine. The analyst wants to confirm if that payload is malicious only, so he will open Virus total and check the hash if it was flagged by other sources. Option A is the correct one.
upvoted 1 times
...
POWNED
1 year, 11 months ago
Selected Answer: C
I was leaning toward C, and verified with other websites that others are leaning toward C as well. Why would you ask and wait for an answer from a trusted source when you could just quickly run a scan and get the answer you are looking for?
upvoted 1 times
...
kiduuu
2 years, 2 months ago
Selected Answer: C
Validating the binaries' hashes from a trusted source or using file integrity monitoring to validate the digital signature may be helpful, but they do not guarantee that the binaries are not malicious. Similarly, only allowing whitelisted binaries to execute can be a good security practice, but it does not address the immediate concern of the potentially compromised machine. Therefore, running an antivirus is the most appropriate step in this scenario.
upvoted 1 times
...
Joshey
2 years, 3 months ago
"after extracting strings..unexpected content"....gives direction to what he is trying to confirm
upvoted 1 times
...
2Fish
2 years, 3 months ago
Selected Answer: A
My thought process is that the AV should have already caught those binaries if they. have the signatures or hash. I would check the binaries hash first. So A for me.
upvoted 3 times
...
talosDevbot
2 years, 4 months ago
Selected Answer: C
Question is asking for the NEXT step. We already know that binaries are already compromised as the questions stated that the analyst observed abnormal behavior and unexpected strings in the file. NEXT step to take is to run an antivirus against the binaries.
upvoted 2 times
Decatur
1 year, 11 months ago
The question states that "binaries that are exhibiting abnormal behaviors", so we do not know that they are compromised, therefor we run a scan to detect malware.
upvoted 1 times
...
...
db97
2 years, 4 months ago
Well... I would run the full anti-malware scan first, in the meantime (while the scanning is in progress), I would go and compare the hash. Both actions at the same time, but the first one it's to rule out/discard/contain/delete a threat in place. If the hash is clean and/or the report shows no results for threats, then we are good :) I talked based on my experience.
upvoted 2 times
...
absabs
2 years, 4 months ago
Selected Answer: A
Validate the hash is first action i think.
upvoted 1 times
...
gnnggnnggnng
2 years, 4 months ago
Selected Answer: C
Validating the hashes of the binaries from a trusted source and using file integrity monitoring to validate the digital signature can be important steps in the forensic analysis process, but they do not directly address the issue of the unexpected content found in the binaries. Running an antivirus against the binaries to check for malware is a more direct step to determine if the abnormal behaviors are a result of malicious activity. If the binaries are found to contain malware, then steps can be taken to mitigate the threat and prevent further harm, such as only allowing whitelisted binaries to execute.
upvoted 1 times
...
MortG7
2 years, 8 months ago
Selected Answer: A
"...After extracting the strings, the analyst finds unexpected content..." something different or something that should not be there...you validate the hash to confirm why data was altered/changed/edited and is not what is expected
upvoted 4 times
...
david124
2 years, 8 months ago
A it is
upvoted 1 times
...
nonjabusiness
2 years, 9 months ago
Selected Answer: C
A wouldn't hurt to do, but C seems like the more thorough answer
upvoted 2 times
...
bigerblue2002
2 years, 9 months ago
Hey amateurguy, I literally said the exact same thing. I also checked another site and they have C as the answer as well. I selected C too. I searched more before Submitting this and found another site for C and another for A. I am going for C!
upvoted 1 times
...
amateurguy
2 years, 9 months ago
This is confusing, why would you try to validate the binaries against a trust source when you already know its a compromised machine and you know theres binaries exhibiting abnormal behaviour. Wouldn't C be the most reasonable thing to do?
upvoted 4 times
MortG7
2 years, 8 months ago
to determine the diff between his binaries and a confirmed good source..the diff being what changed
upvoted 3 times
...
jchutch2
2 years, 9 months ago
To determine which binaries were actually infected or if the malware is coming from elsewhere.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...