ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 291 - CS0-003 discussion

Report
Export

A security analyst has received an incident case regarding malware spreading out of control on a customer's network. The analyst is unsure how to respond. The configured EDR has automatically obtained a sample of the malware and its signature. Which of the following should the analyst perform next to determine the type of malware, based on its telemetry?

A.
Cross-reference the signature with open-source threat intelligence.
Answers
A.
Cross-reference the signature with open-source threat intelligence.
B.
Configure the EDR to perform a full scan.
Answers
B.
Configure the EDR to perform a full scan.
C.
Transfer the malware to a sandbox environment.
Answers
C.
Transfer the malware to a sandbox environment.
D.
Log in to the affected systems and run necstat.
Answers
D.
Log in to the affected systems and run necstat.
Suggested answer: A

Explanation:

The signature of the malware is a unique identifier that can be used to compare it with known malware samples and their behaviors. Open-source threat intelligence sources provide information on various types of malware, their indicators of compromise, and their mitigation strategies. By cross-referencing the signature with these sources, the analyst can determine the type of malware and its telemetry. The other options are not relevant for this purpose: configuring the EDR to perform a full scan may not provide additional information on the malware type; transferring the malware to a sandbox environment may expose the analyst to further risks; logging in to the affected systems and running netstat may not reveal the malware activity.

According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of EDR, a tool used for endpoint security, in chapter 5. Specifically, it explains the meaning and function of malware signatures and how they can be used to identify malware types1, page 203. It also discusses the benefits and challenges of using open-source threat intelligence sources to enhance security analysis1, page 211. Therefore, this is a reliable source to verify the answer to the question.

asked 02/10/2024
Alvin Gonzalez
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first