exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 149 discussion

Actual exam question from CompTIA's CS0-002
Question #: 149
Topic #: 1
[All CS0-002 Questions]

The Chief Information Officer of a large cloud software vendor reports that many employees are falling victim to phishing emails because they appear to come from other employees. Which of the following would BEST prevent this issue?

  • A. Include digital signatures on messages originating within the company.
  • B. Require users to authenticate to the SMTP server.
  • C. Implement DKIM to perform authentication that will prevent the issue.
  • D. Set up an email analysis solution that looks for known malicious links within the email.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
AC6280
Highly Voted 2 years, 3 months ago
Selected Answer: A
Drawing from my email security experience... A- The most likely answer. Digital signatures are just that, signatures that should apply to only you. It provides non-repudiation (you can't deny that you sent it, or at the very least that your machine sent it, or that someone who has the crypto keys sent it) B- This doesn't really stop anything. Sure you have to log in to use your email, but anyone can still spoof you (email is inherently and insanely insecure) C- DKIM is nice as part of email authentication (use DMARC with SPF/DKIM), but DKIM doesn't care about 'friendly from' headers that users see in their mailbox. You can still very much spoof the 'from' field and still pass DKIM (I've had to explain this scenario to customers a gazillion times). D- Doesn't stop the spoofing. Just checks links.
upvoted 11 times
saci_frosty
2 years, 2 months ago
Answer A I agree with you, DKIM won't stop "friendly from" headers, also D doesn't work as the scammer might be trying to trick the user to send them gift cards for instance. I had it happened to a user once. They made the email look like it was coming from the manager asking the employee to buy gift cards and I had to explain why the manager's email hadn't been hacked. Key word of the question is "Appear"
upvoted 1 times
...
...
DaroKa
Highly Voted 2 years, 8 months ago
Selected Answer: C
Following: https://www.examtopics.com/discussions/comptia/view/75177-exam-cs0-002-topic-1-question-239-discussion/
upvoted 5 times
...
RobV
Most Recent 1 year, 5 months ago
Selected Answer: C
C. Implement DKIM to perform authentication that will prevent the issue. Phishing attacks often involve spoofed emails that appear to come from legitimate sources within the organization. DKIM helps address this issue by providing a way to verify the integrity of the email's source. It won't prevent all phishing attacks, but it can significantly reduce the effectiveness of attacks that rely on impersonating internal senders. Option A, including digital signatures on messages originating within the company, is related to DKIM, but DKIM is a more specific and widely adopted standard for email authentication.
upvoted 1 times
...
skibby16
1 year, 6 months ago
Selected Answer: C
DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect email spoofing. By signing outgoing emails with a private key and allowing the recipient to verify the signature using a public key published in the DNS, DKIM helps prevent email forging and ensures the integrity of the email content. Implementing DKIM can significantly reduce the effectiveness of phishing attacks that rely on spoofing the sender's address.
upvoted 1 times
...
32d799a
1 year, 6 months ago
Selected Answer: C
DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect email spoofing
upvoted 1 times
...
uday1985
1 year, 8 months ago
This question is not clear! is the threat actor the employee? someone else spoofed them? if its a threat actor then DKIM. but if its an internal risk then its a different approach
upvoted 1 times
...
naleenh
1 year, 9 months ago
Selected Answer: C
DKIM (DomainKeys Identified Mail) is an email authentication method that allows the sender to prove that they are who they say they are. This helps to prevent phishing emails, which are emails that appear to come from a legitimate source but are actually from a malicious actor.
upvoted 1 times
...
kill_chain
1 year, 9 months ago
Selected Answer: C
DKIM allows organizations to add content to messages to identify them as being from their domain. DKIM signs both the body of the message and elements of the header, helping to ensure that the message is actually from the organization it claims to be from.
upvoted 2 times
...
Sleezyglizzy
1 year, 10 months ago
C from previous dump
upvoted 1 times
...
kiduuu
2 years, 1 month ago
Selected Answer: C
By implementing DKIM, an organization can ensure that emails appearing to come from within the company are legitimate and have not been spoofed by an attacker. This can help prevent employees from falling victim to phishing emails. Option A, including digital signatures on messages originating within the company, is a possible solution. However, this would require all employees to have digital signatures, which may not be practical
upvoted 1 times
...
HereToStudy
2 years, 2 months ago
Selected Answer: A
DKIM is also a valid solution for email authentication, it alone does not address the issue of email spoofing or impersonation in the "friendly from" header. Therefore, in this case, the BEST solution to prevent this issue would be to include digital signatures on messages originating within the company.
upvoted 2 times
...
2Fish
2 years, 2 months ago
Selected Answer: C
C. I like both A and C, my thought process is that DKIM validates the sender on the server level. If I spoof a company username in the 'friendly from' field, DKIM should not allow it as it was sent from a mail server that is not validated.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...