exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 67 discussion

Actual exam question from CompTIA's CS0-003
Question #: 67
Topic #: 1
[All CS0-003 Questions]

While reviewing web server logs, an analyst notices several entries with the same time stamps, but all contain odd characters in the request line. Which of the following steps should be taken next?

  • A. Shut the network down immediately and call the next person in the chain of command.
  • B. Determine what attack the odd characters are indicative of.
  • C. Utilize the correct attack framework and determine what the incident response will consist of.
  • D. Notify the local law enforcement for incident response.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
LiveLaughToasterBath
Highly Voted 1 year, 1 month ago
Selected Answer: B
Do we know what the odd characters are indicative of yet? Is this an attack? We need to investigate and determine if this is an incident first before we consult an attack framework.
upvoted 24 times
...
[Removed]
Highly Voted 1 year, 1 month ago
Selected Answer: C
Y'all need to quit using ChatGPT. The correct choice is C. NOT A) You can't just shut down an entire network. It hasn't been confirmed to be malicious. This is not a good containment practice. NOT B) This is part of the incident analysis process. This just tells you what kind of attack it may be. Your attack framework would be able to identify this better (option C). C. Is correct. Your attack response framework (Kill Chain, MITRE, DIAMOND) will guide your response, and from there, you would begin your incident response, which will include option B and D by the way. You don't just willy nilly take whatever response approach you wish to. Your framework will guide your response. NOT D) It's not always necessary if you are not regulated. Also, this part of incident response process. Option C would include this and is a better option.
upvoted 19 times
...
Thanks_stoneface
Most Recent 2 weeks ago
Selected Answer: B
Incident response doesn’t make sense, they use the word “odd”, it could be benign activity that the analyst just isn’t familiar with.
upvoted 3 times
...
Learner213
1 month, 1 week ago
Selected Answer: C
Follow the guidelines and the standard operating procedures.
upvoted 1 times
...
wajdi
1 month, 3 weeks ago
the correct response is B; typically, when we have suspicions, we need to investigate further to confirm whether there is a real attack before starting the incident response plan
upvoted 2 times
...
iMo7ed
3 months, 1 week ago
Selected Answer: C
I go for C
upvoted 1 times
...
voiddraco
5 months, 1 week ago
I’d choose B cause how can you determine what incident response will consist of if you don't even know what type of attack it is first? I get why ppl picked C but still
upvoted 1 times
voiddraco
5 months ago
Revised and yeah C is right. they actually discussed this on a podcast and a couple youtube videos.
upvoted 3 times
...
...
cartman_sc
7 months, 3 weeks ago
Selected Answer: C
Essa escolha permite uma abordagem organizada e abrangente, garantindo que o tipo de ataque seja identificado e que os passos apropriados para mitigação e resposta sejam seguidos de acordo com as melhores práticas de segurança.
upvoted 2 times
...
Geronemo
7 months, 3 weeks ago
Selected Answer: C
Honestly, C is the only one that makes logical sense... choose c... trust me, scored an 827 on my exam
upvoted 1 times
...
BanesTech
8 months, 2 weeks ago
Selected Answer: B
Analyzing the odd characters in the request line can help determine if they are part of a known attack pattern or if they indicate malicious activity. This step involves investigating the nature of the characters, such as whether they resemble SQL injection attempts, cross-site scripting (XSS) payloads, or other types of injection attacks. Once the nature of the attack is identified, appropriate response actions can be taken, such as implementing security controls to mitigate the attack, blocking malicious IP addresses, or patching vulnerable systems. Options A, C, and D are not suitable as immediate next steps without first understanding the nature and severity of the incident through analysis.
upvoted 1 times
...
cyberwolfhooah
10 months, 3 weeks ago
Selected Answer: C
...............
upvoted 2 times
...
daddylonglegs
11 months, 2 weeks ago
Selected Answer: B
How can you determine what incident response will consist of if you don't even know what type of attack it is first, if it is even an attack at all and not just a false positive?
upvoted 3 times
...
RobV
1 year ago
Selected Answer: B
B. Determine what attack the odd characters are indicative of. In the context of reviewing web server logs, the most immediate and practical step is to investigate the nature of the odd characters in the request line. This involves understanding the patterns, syntax, and characteristics of these entries to determine if they are indicative of a particular attack or anomaly. Simply shutting down the network (option A) or notifying law enforcement (option D) without understanding the nature of the issue might be premature and could disrupt normal operations unnecessarily. Utilizing the correct attack framework (option C) may come into play after identifying the attack type, but the initial focus should be on understanding the nature of the odd characters to assess the potential threat.
upvoted 3 times
jcm3
1 year ago
We get it bro you really love ChatGPT
upvoted 1 times
daddylonglegs
11 months, 2 weeks ago
Not everyone that disagrees with you is using ChatGPT dude
upvoted 2 times
bettyboo
10 months ago
I happen to have a paid subscription of Copyleaks and he is, indeed, using ChatGPT. I just checked his answer on it. Came ALL red.
upvoted 1 times
high_My_name_is
9 months ago
GPTZero backs up this claim
upvoted 1 times
...
...
...
...
...
throughthefray
1 year ago
Gonna go against the grain here and say C. Why waste your time figuring out what the symbols are when you may already have a plan that tells you what to do if you see odd symbols in your web server logs?
upvoted 3 times
RobV
1 year ago
While having a plan is important, it's equally crucial to understand the context of each incident. Jumping directly to a predefined response without understanding the specifics of the odd characters may lead to overreactions or overlooking critical nuances.
upvoted 5 times
...
...
deeden
1 year, 1 month ago
Selected Answer: B
agree with option B. odd characters on web server logs could be double encoding or obfuscation technique to conceal the actual payload. analyst may want to find out whether the attacker was successful or could be false-positive. in any case, i think more information in needed in order to navigate any attack framework.
upvoted 5 times
daddylonglegs
11 months, 2 weeks ago
Agreed, you need to know the type of attack, if it even is an attack, before you can respond effectively.
upvoted 1 times
...
...
VVV4WIN
1 year, 1 month ago
Selected Answer: C
I go for C
upvoted 1 times
...
FFF080
1 year, 1 month ago
From Chatgpt: You're correct; option C suggests a more comprehensive approach that involves utilizing the correct attack framework and determining the incident response plan. This step includes both understanding the nature of the attack (similar to option B) and planning the appropriate response to mitigate the impact and prevent further damage.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago