exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 279 discussion

Actual exam question from CompTIA's CS0-002
Question #: 279
Topic #: 1
[All CS0-002 Questions]

An organization has been seeing increased levels of malicious traffic. A security analyst wants to take a more proactive approach to identify the threats that are acting against the organization's network. Which of the following approaches should the security analyst recommend?

  • A. Use the MITRE ATT&CK framework to develop threat models.
  • B. Conduct internal threat research and establish indicators of compromise.
  • C. Review the perimeter firewall rules to ensure the accuracy of the rule set.
  • D. Use SCAP scans to monitor for configuration changes on the network.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
db97
Highly Voted 2 years, 5 months ago
Selected Answer: B
https://www.examtopics.com/discussions/comptia/view/69696-exam-cs0-002-topic-1-question-212-discussion/
upvoted 10 times
...
zecomeia_007
Most Recent 1 year, 1 month ago
Selected Answer: B
ATT&CK is valuable for understanding attacker behavior, it's a foundational tool. It won't directly identify ongoing threats in the organization's network.
upvoted 1 times
...
novolyus
1 year, 7 months ago
Selected Answer: B
If you want to identify threats you need threat research
upvoted 1 times
...
grelaman
1 year, 9 months ago
Selected Answer: B
The security analyst wants to take a proactive approach to identify the threats, which suggests that they are not yet known. So the analyst can perform the following techniques: Threat hunting: This involves actively searching for indicators of compromise (IOCs), unusual behaviors, and hidden threats within the organization's network or Threat intelligence: This involves gathering and analyzing information about known and emerging threats to improve the organization's security posture.
upvoted 1 times
grelaman
1 year, 9 months ago
Why not A., because MITRE ATT&CK is a threat model and Threat modeling is a valuable tool for understanding the threats that an organization faces, but it is not a proactive approach of detecting threats that you have not identified yet.
upvoted 2 times
...
...
Dany_Suarez
2 years ago
Selected Answer: A
CompTIA guide says: Threat hunting utilizes insights gained from threat research and threat modeling to proactively discover whether there is evidence of TTPs already present within the network or system. This contrasts with a reactive process that is only triggered when alert conditions are reported through an incident management system.
upvoted 1 times
...
Sleezyglizzy
2 years ago
A it was not B on the last dump so it wouldn't be it now
upvoted 2 times
...
kyky
2 years ago
Selected Answer: A
A. Use the MITRE ATT&CK framework to develop threat models. The security analyst should recommend using the MITRE ATT&CK framework to develop threat models. The MITRE ATT&CK framework is a comprehensive knowledge base that catalogs and organizes different techniques and tactics used by threat actors during various stages of a cyberattack. By using this framework, organizations can proactively identify and understand potential threats and develop effective defense strategies. The framework provides a structured approach to mapping and analyzing attack techniques, enabling security teams to stay ahead of evolving threats and improve their overall security posture.
upvoted 1 times
...
kiduuu
2 years, 2 months ago
Selected Answer: A
With MITRE ATT&CK framework the security analyst can identify potential attack vectors and understand the tactics and techniques used by threat actors. This approach can help the organization proactively identify and prevent attacks before they occur. Conducting internal threat research and establishing indicators of compromise, IS a REACTIVE approach that is NOT proactive. It is more focused on responding to incidents after they occur, rather than preventing them from occurring in the first place.
upvoted 2 times
...
HereToStudy
2 years, 3 months ago
Selected Answer: A
I’m going with A. B is reactive
upvoted 2 times
...
khrid4
2 years, 3 months ago
Selected Answer: B
only information we have is increased levels of malicious traffic. Too early to map TTP on Mitre Att&ck framework in my opinion. In any case, if you are in the field, most likely that threat research will always be part of it.
upvoted 2 times
...
Henry88
2 years, 4 months ago
Selected Answer: A
Keyword: "Proactive" threat hunting is the only answer here that is proactive.
upvoted 2 times
Henry88
2 years, 4 months ago
Edit I meant B not A
upvoted 4 times
...
...
TheStudiousPeepz
2 years, 4 months ago
Selected Answer: A
Because commenting was too short, its A
upvoted 2 times
...
Kashim
2 years, 4 months ago
Selected Answer: B
"proactive approach to identify the threats" it is definition of threat hunting so the answer is B
upvoted 4 times
...
mraval
2 years, 4 months ago
Selected Answer: A
A is the Correct answer, In the question it asking Analyst wanted to identified type of threat not IoC inside the organization. A is definitely correct answer.
upvoted 2 times
...
G_f_b
2 years, 4 months ago
Selected Answer: A
saw a comment thatai said b.. but gpt says a.. A. Using the MITRE ATT&CK framework to develop threat models is the BEST approach the security analyst should recommend to identify the threats that are acting against the organization's network in a more proactive manner. The MITRE ATT&CK framework is a comprehensive knowledge base of adversary tactics and techniques based on real-world observations of cyberattacks. It provides a structured and systematic approach to developing threat models by identifying the various tactics and techniques that an adversary may use to carry out an attack. By using the MITRE ATT&CK framework, the security analyst can gain a better understanding of the potential threats and develop a proactive approach to detect and respond to them. Conducting internal threat research and establishing indicators of compromise (Option B) can also be an effective approach to identifying threats; however, it is a more reactive approach and may not be as proactive as using the MITRE ATT&CK framework.
upvoted 4 times
...
Sam_0735
2 years, 5 months ago
Selected Answer: B
According Ai, The most appropriate answer is B. Conducting internal threat research will help the analyst identify the types of threats that are currently directed at the organization, better understand attack patterns, and establish indicators of compromise (IoC) based on this data. These IoCs can then be used to detect threats in the future, as well as to adjust security strategies. The other options are not as proactive and do not fully identify current threats.
upvoted 3 times
...
gnnggnnggnng
2 years, 5 months ago
Selected Answer: A
I chose A, Use the MITRE ATT&CK framework to develop threat models, because it is the most comprehensive and proactive approach to identifying the threats that are acting against an organization's network. The MITRE ATT&CK framework is a comprehensive knowledge base of tactics, techniques, and procedures used by threat actors. By using this framework to develop threat models, security analysts can identify potential threats, assess the risk they pose, and develop mitigation strategies to prevent or minimize the impact of an attack.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...