exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 271 discussion

Actual exam question from CompTIA's CS0-002
Question #: 271
Topic #: 1
[All CS0-002 Questions]

An organization was alerted to a possible compromise after its proprietary data was found for sale on the internet. An analyst is reviewing the logs from the next-generation UTM in an attempt to find evidence of this breach. Given the following output:



Which of the following should be the focus of the investigation?

  • A. webserver.org-dmz.org
  • B. sftp.org-dmz.org
  • C. 83hht23.org-int.org
  • D. ftps.bluemed.net
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
catastrophie
Highly Voted 2 years, 5 months ago
Selected Answer: A
C is not the correct answer. 83hht23.org-int.org reaches out to 8.8.8.8 (Google DNS) on the correct port 53. Google DNS give name resolution and 83hht23.org-int.org connects to Yandex.ru via HTTPS on correct port 443. (Yandex.ru was ok, its just google in Russia. Test makers are just trying to be inclusive) webserver.org-dmz.org reaches out to whatever 131.52.88.45 is… maybe it’s a DNS server….. on port 53 weird but so far ok… webserver.org-dmz.org then reaches out to 131.52.88.45 with HTTPS protocol on port 10999. Now the red flag is thrown out. 10999 is not the standard port for HTTPS. It does it twice. webserver.org-dmz.org = bad
upvoted 20 times
ZUL01
2 years, 4 months ago
Only reasonable answer I see here
upvoted 2 times
...
2Fish
2 years, 4 months ago
A. This is a good explanation. Bottom line.. that gigantic port number for HTTPS is a big red flag.
upvoted 3 times
...
lovesheandi
2 years, 4 months ago
I really appreciate your comment.
upvoted 1 times
...
...
skibby16
Most Recent 1 year, 9 months ago
Selected Answer: D
The focus of the investigation should be on the traffic to "ftps.bluemed.net" because this domain stands out as it's not part of the organization's typical internal or external domains. The fact that the organization's proprietary data was found for sale on the internet suggests that an unauthorized transfer of data may have occurred. Therefore, analyzing traffic to external domains that are not recognized or part of normal operations is crucial in this scenario.
upvoted 1 times
...
respect9602
2 years, 2 months ago
Cyka Blyat! Ivan is up to no good.
upvoted 1 times
...
opem
2 years, 4 months ago
Selected Answer: A
https://www.examtopics.com/discussions/comptia/view/42706-exam-cs0-002-topic-1-question-117-discussion/
upvoted 1 times
...
knister
2 years, 4 months ago
Selected Answer: A
Going with A here. Ports are too suspicious.
upvoted 1 times
talosDevbot
2 years, 4 months ago
Ports are not suspicious because those are expected from a client. If you see those port on the HTTP(S) server (source port), then that would be suspicious
upvoted 1 times
...
...
talosDevbot
2 years, 4 months ago
Selected Answer: D
Key phrase in the question: "possible compromise after its proprietary data was found for sale on the internet" Out of all the options, ftps.bluemed.net should be investigated since this is an external host that interacted with the organization's FTP server. 83hht23.org-int.org is an internal host browsing the internet, making DNS queries to Google DNS and visiting the Yandex website. Unsuspicious. webserver.org-dmz.org is the web server in the DMZ. Traffic looks unsuspicious
upvoted 1 times
...
db97
2 years, 5 months ago
Going with A here, there is a big red flag for an https connection using a non-standard port.
upvoted 3 times
db97
2 years, 5 months ago
Forgot to mention that it attempted a DNS connection before the HTTPS one. This looks bad.
upvoted 3 times
...
...
encxorblood
2 years, 5 months ago
Selected Answer: C
Based on the information provided, the focus of the investigation should be option C, 83hht23.org-int.org. This domain appears to be communicating with external systems over DNS and HTTPS ports. It is possible that this communication is related to the possible data breach and the data being sold on the internet. Further investigation is needed to determine whether this communication is legitimate or malicious.
upvoted 1 times
...
CatoFong
2 years, 5 months ago
Selected Answer: C
C is correct
upvoted 1 times
...
gnnggnnggnng
2 years, 5 months ago
Selected Answer: C
C. 83hht23.org-int.org should be the focus of the investigation. The logs show that this IP is sending DNS queries to 8.8.8.8 (Google's DNS) and making HTTPS connections to 77.88.55.66 (yandex.ru). This could indicate that the IP is attempting to exfiltrate data or carry out other malicious activities. Further investigation is necessary to determine the nature and extent of the compromise.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...