ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 187 - CS0-003 discussion

Report
Export

A security analyst is reviewing events that occurred during a possible compromise. The analyst obtains the following log:

Which of the following is most likely occurring, based on the events in the log?

A.
An adversary is attempting to find the shortest path of compromise.
Answers
A.
An adversary is attempting to find the shortest path of compromise.
B.
An adversary is performing a vulnerability scan.
Answers
B.
An adversary is performing a vulnerability scan.
C.
An adversary is escalating privileges.
Answers
C.
An adversary is escalating privileges.
D.
An adversary is performing a password stuffing attack. .
Answers
D.
An adversary is performing a password stuffing attack. .
Suggested answer: B

Explanation:

Based on the events in the log, the most likely occurrence is that an adversary is performing a vulnerability scan. The log shows LDAP read operations and EDR enumerating local groups, which are indicative of an adversary scanning the system to find vulnerabilities or sensitive information. The final entry shows SMB connection attempts to multiple hosts from a single host, which could be a sign of network discovery or lateral movement.

Reference: CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition, Chapter 4: Security Operations and Monitoring, page 161; Monitor logs from vulnerability scanners, Section: Reports on Nessus vulnerability data.

asked 02/10/2024
Venkateswar Parupalli
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first