ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 310 - CS0-003 discussion

Report
Export

A list of loCs released by a government security organization contains the SHA-256 hash for a Microsoft-signed legitimate binary, svchost. exe. Which of the following best describes the result if security teams add this indicator to their detection signatures?

A.
This indicator would fire on the majority of Windows devices.
Answers
A.
This indicator would fire on the majority of Windows devices.
B.
Malicious files with a matching hash would be detected.
Answers
B.
Malicious files with a matching hash would be detected.
C.
Security teams would detect rogue svchost. exe processes in their environment.
Answers
C.
Security teams would detect rogue svchost. exe processes in their environment.
D.
Security teams would detect event entries detailing execution of known-malicious svchost. exe processes.
Answers
D.
Security teams would detect event entries detailing execution of known-malicious svchost. exe processes.
Suggested answer: A

Explanation:

Adding the SHA-256 hash of a legitimate Microsoft-signed binary like svchost.exe to detection signatures would result in the indicator firing on the majority of Windows devices. Svchost.exe is a common and legitimate system process used by Windows, and using its hash as an indicator of compromise (IOC) would generate numerous false positives, as it would match the legitimate instances of svchost.exe running on all Windows systems.

asked 02/10/2024
Edward Eric
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first