ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 104 - CS0-003 discussion

Report
Export

A security analyst is reviewing the following alert that was triggered by FIM on a critical system:

Which of the following best describes the suspicious activity that is occurring?

A.
A fake antivirus program was installed by the user.
Answers
A.
A fake antivirus program was installed by the user.
B.
A network drive was added to allow exfiltration of data
Answers
B.
A network drive was added to allow exfiltration of data
C.
A new program has been set to execute on system start
Answers
C.
A new program has been set to execute on system start
D.
The host firewall on 192.168.1.10 was disabled.
Answers
D.
The host firewall on 192.168.1.10 was disabled.
Suggested answer: C

Explanation:

A new program has been set to execute on system start is the most likely cause of the suspicious activity that is occurring, as it indicates that the malware has modified the registry keys of the system to ensure its persistence. File Integrity Monitoring (FIM) is a tool that monitors changes to files and registry keys on a system and alerts the security analyst of any unauthorized or malicious modifications. The alert triggered by FIM shows that the malware has created a new registry key under the Run subkey, which is used to launch programs automatically when the system starts. The new registry key points to a file named ''update.exe'' in the Temp folder, which is likely a malicious executable disguised as a legitimate update file. Official

Reference:

https://www.comptia.org/blog/the-new-comptia-cybersecurity-analyst-your-questions-answered

https://partners.comptia.org/docs/default-source/resources/comptia-cysa-cs0-002-exam-objectives

https://www.comptia.org/training/books/cysa-cs0-002-study-guide

asked 02/10/2024
Venkata Shiva Rajesh Boyinapalli
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first