ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 232 - CS0-003 discussion

Report
Export

A threat hunter seeks to identify new persistence mechanisms installed in an organization's environment. In collecting scheduled tasks from all enterprise workstations, the following host details are aggregated:

Which of the following actions should the hunter perform first based on the details above?

A.
Acquire a copy of taskhw.exe from the impacted host
Answers
A.
Acquire a copy of taskhw.exe from the impacted host
B.
Scan the enterprise to identify other systems with taskhw.exe present
Answers
B.
Scan the enterprise to identify other systems with taskhw.exe present
C.
Perform a public search for malware reports on taskhw.exe.
Answers
C.
Perform a public search for malware reports on taskhw.exe.
D.
Change the account that runs the -caskhw. exe scheduled task
Answers
D.
Change the account that runs the -caskhw. exe scheduled task
Suggested answer: C

Explanation:

The first step should be to perform a public search for malware reports on taskhw.exe, as this file is suspicious for several reasons: it is located in a non-standard path, it has a high CPU usage, it is signed by an unknown entity, and it is only present on one host. A public search can help to determine if this file is a known malware or a legitimate program. If it is malware, the hunter can then take appropriate actions to remove it and prevent further damage. The other options are either premature or ineffective, as they do not provide enough information to assess the threat level of taskhw.exe.Reference:Cybersecurity Analyst+ - CompTIA,taskhw.exe Windows process - What is it? - file.net,Taskhostw.exe - What Is Taskhostw.exe & Is It Malware? - MalwareTips Forums

asked 02/10/2024
Andrew Naftel
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first