ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 11 - SY0-601 discussion

Report
Export

During an incident a company CIRT determine it is necessary to observe the continued network- based transaction between a callback domain and the malware running on an enterprise PC. Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk that the adversary would notice any changes?

A.
Physical move the PC to a separate internet pint of presence
Answers
A.
Physical move the PC to a separate internet pint of presence
B.
Create and apply micro segmentation rules.
Answers
B.
Create and apply micro segmentation rules.
C.
Emulate the malware in a heavily monitored DM Z segment.
Answers
C.
Emulate the malware in a heavily monitored DM Z segment.
D.
Apply network blacklisting rules for the adversary domain
Answers
D.
Apply network blacklisting rules for the adversary domain
Suggested answer: C

Explanation:

To observe the continued network-based transaction between a callback domain and the malware running on an enterprise PC while reducing the risk of lateral spread and the risk that the adversary would notice any changes, the best technique to use is to emulate the malware in a heavily monitored DMZ segment. This is a secure environment that is isolated from the rest of the network and can be heavily monitored to detect any suspicious activity. By emulating the malware in this environment, the activity can be observed without the risk of lateral spread or detection by the adversary. Reference: https://www.sans.org/blog/incident-response-fundamentals-why-is-the-dmz- so-important/

asked 02/10/2024
Daniel Yamamoto
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first