exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 214 discussion

Actual exam question from CompTIA's CS0-002
Question #: 214
Topic #: 1
[All CS0-002 Questions]

A company recently experienced similar network attacks. To determine whether the attacks were identical, the company should gather a list of IPs domains, and files and use:

  • A. behavior data
  • B. the Diamond Model of Intrusion Analysis.
  • C. the attack kill chain.
  • D. the reputational data.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
encxorblood
Highly Voted 2 years, 2 months ago
Selected Answer: B
B. The Diamond Model of Intrusion Analysis is the best option to use when a company wants to determine if similar network attacks are identical or related. The Diamond Model of Intrusion Analysis is a structured approach to analyzing cyber threats that involves gathering and correlating data about four key elements: adversary, capability, infrastructure, and victim. By analyzing these elements in relation to a particular incident, it is possible to identify patterns and connections that can help to determine whether similar attacks are related or not.
upvoted 5 times
2Fish
2 years, 1 month ago
Agree. I had to go back and research to make sure, but you guys are spot on.
upvoted 1 times
...
...
chaddman
Most Recent 1 year, 6 months ago
If the objective is to determine whether the attacks were identical, B. The Diamond Model of Intrusion Analysis would be the most appropriate choice. This model allows for a detailed, multi-faceted analysis of intrusions, making it easier to compare different attacks based on various parameters like the adversary involved, the capabilities used, the infrastructure employed, and the victims targeted.
upvoted 1 times
...
iraidesc
2 years, 3 months ago
Selected Answer: B
To determine whether the recent attacks on a company's network were identical, the company should use the Diamond Model of Intrusion Analysis. This model is a framework for analyzing and understanding the various stages of a cyber attack and the techniques and tools used by the attacker. The Diamond Model provides a structured approach to gather and analyze data from the attack, such as IP addresses, domains, and files, and then compare them to previous attacks to determine if they are identical or not.
upvoted 2 times
...
TKW36
2 years, 4 months ago
Selected Answer: B
B is the right answer. The Diamond Model is literally designed to do what is asked in this question. Behavior data can be useful to detect abnormal or anomalous behavior in the network, but it's not the best option to determine whether the attacks were identical.
upvoted 1 times
...
DynamicTech
2 years, 5 months ago
The correct answer is B
upvoted 1 times
...
Comptia_Secret_Service
2 years, 5 months ago
Selected Answer: B
This is B.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago