exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 267 discussion

Actual exam question from CompTIA's CAS-004
Question #: 267
Topic #: 1
[All CAS-004 Questions]

A security analyst has concerns about malware on an endpoint. The malware is unable to detonate by modifying the kernel response to various system calls. As a test, the analyst modifies a Windows server to respond to system calls as if it was a Linux server. In another test, the analyst modifies the operating system to prevent the malware from identifying target files. Which of the following techniques is the analyst MOST likely using?

  • A. Honeypot
  • B. Deception
  • C. Simulators
  • D. Sandboxing
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Amin4799
Highly Voted 1 year, 9 months ago
Selected Answer: B
Deception involves creating a false reality that attackers or malware will interact with, in order to detect and respond to threats
upvoted 7 times
...
deeden
Most Recent 1 month ago
Selected Answer: A
While it is best to secure this in a sandbox, the actual effort employed by the analyst can be called Deception trying to fool the malware. Analyst can also use Static, Dynamic, Behavioral analysis, as well as Reverse Engineering.
upvoted 1 times
...
881cfb8
1 month ago
Selected Answer: B
Don't overthink it. He's deceiving regardless if he's in a sandbox or love environment. Question wants what method is spoofing os fingerprint not where he's performing jt
upvoted 1 times
...
Bright07
1 month, 1 week ago
Selected Answer: B
Deception techniques involve creating an environment or modifying a system in a way that misleads attackers or malware. This could include altering system behavior or making the malware believe it is operating in a different environment than it actually is (like modifying system calls to mimic Linux responses or hiding files). The goal is to confuse or distract the malware, preventing it from successfully completing its attack. While D. Sandboxing: Sandboxing is a technique where a program or process is isolated from the rest of the system to prevent it from causing harm. While related to security, this involves creating isolated environments for testing, not modifying the operating system to deceive the malware. So, Deception (B) is the correct answer because the analyst is intentionally modifying system behaviors to confuse or mislead the malware.
upvoted 1 times
...
rice3cooker
3 months, 3 weeks ago
Selected Answer: D
It seems like overall it is D because the pen tester is trying all these techniques in a safe environment and not actively on the network
upvoted 1 times
...
EAlonso
6 months ago
B. This is the definition of Deception.
upvoted 1 times
...
rice3cooker
6 months ago
Selected Answer: D
D sand boxing since deception is used to mislead hackers but here it looks like they are just testing out malware and denoting them
upvoted 2 times
...
SangSang
7 months ago
Selected Answer: B
Deception techniques involve altering the environment to mislead malware or attackers, making them believe they are in a different environment than they are. By "modifying the Windows server to respond like a Linux server and preventing the malware from identifying target files", this use to confuse and potentially neutralize the malware’s effectiveness.
upvoted 3 times
...
e020fdc
11 months ago
Selected Answer: D
I was torn between C and D, but sandboxing is more specific to security analysts so that's what I'll go with.
upvoted 1 times
...
Anarckii
1 year ago
Selected Answer: C
No where in the question does it state that the analyst is doing this in a separate environment isolated form the current environment. So it can't be a sandbox. In the question it even tells us " As a test, the analyst modifies a Windows server to respond to system calls as if it was a Linux server" This means he is doing it on an actual sever to SIMULATE a linux sever.
upvoted 1 times
...
Anarckii
1 year ago
Selected Answer: B
It comes down to B and D. No where in the scenario talks about isolating and modifying files on a server. So it would be deception, the analyst is deliberately modifying the system to respond falsely to system calls, creating deception for the malware
upvoted 2 times
Anarckii
1 year ago
Changing to C
upvoted 1 times
...
...
nuel_12
1 year, 1 month ago
Selected Answer: B
deception is the best answer from the scenario
upvoted 3 times
...
hheerreessjjoohhnnyy
1 year, 3 months ago
Selected Answer: D
Going with Sandboxing (D) on this one. Only other option would be (B) Deception, but that doesn't quite fit this scenario according to the definition below: "Deception technology is a category of incident detection and response technology that helps security teams detect, analyze, and defend against advanced threats by enticing attackers to interact with false IT assets deployed within your network." https://www.rapid7.com/fundamentals/deception-technology/
upvoted 3 times
...
POWNED
1 year, 3 months ago
Selected Answer: D
Sandbox
upvoted 3 times
...
Meep123
1 year, 3 months ago
Selected Answer: D
Im going with sandboxing here. From reading, it seems deception is a more in-depth and automated version of honey-potting, which can be scaled up to a mimic of a production network to be used to monitor advanced cyber threats.
upvoted 2 times
Meep123
1 year, 3 months ago
Here's one of the better explainations I've seen: "At a high level, sandboxing involves installing and allowing malware to run for behavioral observation, while honeypots and nets focus on the analysis of threat actors conducting reconnaissance on an infiltrated network, and security deception is the more recent conception of advanced intrusion detection and prevention. Deception technologies offer more realistic honeynets that are easier to deploy and provide more information to users, but they come with higher budgetary and expertise requirements that typically restrict their use to large enterprises ... at least for the moment." Further research shows a lot of pairing of honeynets and security deception technologies and descriptions, and expanded upon together. In summary, "Deception" here, I believe, is to be tricky and invoke a human understanding of deception (lying), rather than a security understanding (advanced honeynet).
upvoted 1 times
...
...
imather
1 year, 5 months ago
Selected Answer: D
Deception technology is used to observe how an attacker moves through the network and exploits an asset. I haven't read on deceptive technology being actively modified to test malware. This sounds more like a sandbox.
upvoted 1 times
...
fb2fcb1
1 year, 6 months ago
Selected Answer: B
B. Deception The analyst is most likely using deception techniques to deceive the malware and hinder its functionality. Deception involves creating an environment that misleads or confuses attackers or malware, making it harder for them to carry out their malicious activities. In the given scenario, the analyst modifies the Windows server to respond to system calls as if it was a Linux server. This deceptive modification aims to confuse the malware, which might be specifically designed to target Windows systems. By presenting a different system environment, the analyst disrupts the malware's ability to execute its intended functionality. Additionally, the analyst modifies the operating system to prevent the malware from identifying target files. This manipulation further adds to the deception strategy by hiding or altering the expected system behavior, making it challenging for the malware to locate and access its intended targets. Overall, these actions align with the concept of deception as a defensive technique to mislead and impede the functionality of malware.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago