ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 245 - CAS-004 discussion

Report
Export

A security architect is designing a solution for a new customer who requires significant security capabilities in its environment. The customer has provided the architect with the following set of requirements:

* Capable of early detection of advanced persistent threats.

* Must be transparent to users and cause no performance degradation.

+ Allow integration with production and development networks seamlessly.

+ Enable the security team to hunt and investigate live exploitation techniques.

Which of the following technologies BEST meets the customer's requirements for security capabilities?

A.
Threat Intelligence
Answers
A.
Threat Intelligence
B.
Deception software
Answers
B.
Deception software
C.
Centralized logging
Answers
C.
Centralized logging
D.
Sandbox detonation
Answers
D.
Sandbox detonation
Suggested answer: B

Explanation:

Deception software is a technology that creates realistic but fake assets (such as servers, applications, data, etc.) that mimic the real environment and lure attackers into interacting with them.By doing so, deception software can help detect advanced persistent threats (APTs) that may otherwise evade traditional security tools12.Deception software can also provide valuable insights into the attacker's tactics, techniques, and procedures (TTPs) by capturing their actions and behaviors on the decoys13.

Deception software can meet the customer's requirements for security capabilities because:

It is capable of early detection of APTs by creating attractive targets for them and alerting security teams when they are engaged12.

It is transparent to users and causes no performance degradation because it does not interfere with legitimate traffic or resources13.

It allows integration with production and development networks seamlessly because it can create decoys that match the network topology and configuration13.

It enables the security team to hunt and investigate live exploitation techniques because it can record and analyze the attacker's activities on the decoys13.

asked 02/10/2024
Craig Reid
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first