ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 257 - CAS-004 discussion

Report
Export

An analyst received a list of IOCs from a government agency. The attack has the following characteristics:

1- The attack starts with bulk phishing.

2- If a user clicks on the link, a dropper is downloaded to the computer.

3- Each of the malware samples has unique hashes tied to the user.

The analyst needs to identify whether existing endpoint controls are effective. Which of the following risk mitigation techniques should the analyst use?

A.
Update the incident response plan.
Answers
A.
Update the incident response plan.
B.
Blocklist the executable.
Answers
B.
Blocklist the executable.
C.
Deploy a honeypot onto the laptops.
Answers
C.
Deploy a honeypot onto the laptops.
D.
Detonate in a sandbox.
Answers
D.
Detonate in a sandbox.
Suggested answer: D

Explanation:

Detonating the malware in a sandbox is the best way to analyze its behavior and determine whether the existing endpoint controls are effective. A sandbox is an isolated environment that mimics a real system but prevents any malicious actions from affecting the actual system. By detonating the malware in a sandbox, the analyst can observe how it interacts with the system, what files it creates or modifies, what network connections it establishes, and what indicators of compromise it exhibits. This can help the analyst identify the malware's capabilities, objectives, and weaknesses. A sandbox can also help the analyst compare different malware samples and determine if they are related or part of the same campaign.

asked 02/10/2024
Marcelo Severo
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first