ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 107 - CS0-003 discussion

Report
Export

An incident response team is working with law enforcement to investigate an active web server compromise. The decision has been made to keep the server running and to implement compensating controls for a period of time. The web service must be accessible from the internet via the reverse proxy and must connect to a database server. Which of the following compensating controls will help contain the adversary while meeting the other requirements? (Select two).

A.
Drop the tables on the database server to prevent data exfiltration.
Answers
A.
Drop the tables on the database server to prevent data exfiltration.
B.
Deploy EDR on the web server and the database server to reduce the adversaries capabilities.
Answers
B.
Deploy EDR on the web server and the database server to reduce the adversaries capabilities.
C.
Stop the httpd service on the web server so that the adversary can not use web exploits
Answers
C.
Stop the httpd service on the web server so that the adversary can not use web exploits
D.
use micro segmentation to restrict connectivity to/from the web and database servers.
Answers
D.
use micro segmentation to restrict connectivity to/from the web and database servers.
E.
Comment out the HTTP account in the / etc/passwd file of the web server
Answers
E.
Comment out the HTTP account in the / etc/passwd file of the web server
F.
Move the database from the database server to the web server.
Answers
F.
Move the database from the database server to the web server.
Suggested answer: B, D

Explanation:

Deploying EDR on the web server and the database server to reduce the adversaries capabilities and using micro segmentation to restrict connectivity to/from the web and database servers are two compensating controls that will help contain the adversary while meeting the other requirements. A compensating control is a security measure that is implemented to mitigate the risk of a vulnerability or an attack when the primary control is not feasible or effective. EDR stands for Endpoint Detection and Response, which is a tool that monitors endpoints for malicious activity and provides automated or manual response capabilities. EDR can help contain the adversary by detecting and blocking their actions, such as data exfiltration, lateral movement, privilege escalation, or command execution. Micro segmentation is a technique that divides a network into smaller segments based on policies and rules, and applies granular access controls to each segment. Micro segmentation can help contain the adversary by isolating the web and database servers from other parts of the network, and limiting the traffic that can flow between them. Official

Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-cysa-cs0-002-exam-objectives

https://www.comptia.org/certifications/cybersecurity-analyst

https://www.comptia.org/blog/the-new-comptia-cybersecurity-analyst-your-questions-answered

asked 02/10/2024
Kaddy Kabuya
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first