exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 130 discussion

Actual exam question from CompTIA's CS0-003
Question #: 130
Topic #: 1
[All CS0-003 Questions]

Following a recent security incident, the Chief Information Security Officer is concerned with improving visibility and reporting of malicious actors in the environment. The goal is to reduce the time to prevent lateral movement and potential data exfiltration. Which of the following techniques will best achieve the improvement?

  • A. Mean time to detect
  • B. Mean time to respond
  • C. Mean time to remediate
  • D. Service-level agreement uptime
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kmordalv
Highly Voted 1 year, 7 months ago
Selected Answer: A
Correct Improving the Mean Time to Detect (MTTD) is the most relevant technique to achieve the goal of reducing the time to prevent lateral movement and potential data exfiltration by malicious actors. MTTD measures the average time it takes for an organization to detect a security incident or malicious activity once it has occurred. By reducing MTTD, you can identify security threats more quickly, which allows for a faster response to contain the threat, prevent lateral movement, and potentially stop data exfiltration before it occurs.
upvoted 16 times
...
Narobi
Highly Voted 1 year, 4 months ago
Selected Answer: A
Both A and B would reduce the time to prevent lateral movement and potential data exfiltration. If A was improved, the team would be able to act sooner If B was improved, the team would respond faster The CISO wants to improve "visibility and reporting of malicious actors". Only A addresses this. As with B, the reporting has already occurred. Given this, my answer is A.
upvoted 8 times
...
Susan4041
Most Recent 4 weeks, 1 day ago
Selected Answer: B
So detection is good but it does nothing other then detect the the issue is more how fast you respond to the issue. its b
upvoted 1 times
...
TT
2 months, 3 weeks ago
Selected Answer: A
This was hard. I went with A because it asked "Which of the following techniques will best achieve the improvement?" The improvement was "visibility and reporting." If they would've asked "...best achieve the goal?" i would've chose B. This is gross.
upvoted 1 times
...
Eluis007
6 months ago
concerned with improving visibility and reporting of malicious actors in the environment. Which of the following techniques will best achieve the improvement? Mean Time to Detect
upvoted 2 times
...
cy_analyst
6 months, 2 weeks ago
Selected Answer: A
Mean Time to Respond (MTTR): While this refers to the time it takes to respond to an incident after detection, improving MTTD is more crucial in this case because faster detection leads to earlier responses.
upvoted 1 times
...
jkalfo
7 months ago
Selected Answer: A
the question clearly states " Chief Information Security Officer is concerned with improving visibility and reporting of malicious actors in the environment" how can you respond if your detection systems are slow and the problem has traversed through the system already....
upvoted 1 times
...
boog
10 months ago
'Prevent' is a type of response
upvoted 1 times
...
c83335b
11 months ago
Selected Answer: B
guys it can't be A. The goal is to reduce the time to prevent lateral movement and potential data exfiltration so it most be B. Because Detecting doesn't stop anything from happening.
upvoted 3 times
Freshly
5 months, 1 week ago
My friend... You can't respond to something you have not detected. Even if you responded in 2 mins, if your detection took 1-2 hrs... How does that benefit the nature of security. Visibility comes through detection. This is why edr's and siems are important. Imagine showing up to work and there are no alerts and you have to actively threat hunt everything from scratch... Your response time will take you days upon days... By the time you do find malicious activity the malware has already gotten what it came for. Shorten your detection first and then you can respond.
upvoted 1 times
...
...
myazureexams
11 months ago
Selected Answer: B
Per CertMaster: Mean Time to Respond is "a metric that measure the average time it takes to respond to an incident. It measures the speed and efficiency of response activities related to a detected event." Mean Time to Detect "measures the average time between the initial appearance of a security incident and its detection." In this question, the CISO wants to prevent 'lateral movement and prevent data exfiltration" AFTER an event has been detected. So my answer is B Mean Time To Respond - that is, in order to prevent data exfiltration and lateral movement. To me that is a response that needs to be taken AFTER detection.
upvoted 2 times
...
Dub3
11 months, 1 week ago
Selected Answer: B
Security event already happened. Definitely MTTR
upvoted 3 times
...
Ree1234
11 months, 1 week ago
Selected Answer: B
The question specifically mentions improving the visibility and reporting of malicious actors to reduce the time to prevent lateral movement and potential data exfiltration. Option B, "Mean time to respond," directly addresses the need to react swiftly once a security incident is detected.
upvoted 2 times
...
Geronemo
11 months, 1 week ago
Selected Answer: B
Mean time to respond (MTTR) refers to the average time it takes an organization to respond to a security incident once it has been detected. By focusing on reducing the mean time to respond, the organization can improve its ability to react promptly to security incidents, thereby minimizing the window of opportunity for malicious actors to carry out lateral movement or data exfiltration. This involves establishing efficient incident response processes, including detection, analysis, containment, eradication, and recovery. Improving MTTR enhances the organization's overall security posture and helps in mitigating the impact of security incidents.
upvoted 5 times
...
BanesTech
11 months, 3 weeks ago
Selected Answer: B
The question specifically mentions improving the visibility and reporting of malicious actors to reduce the time to prevent lateral movement and potential data exfiltration. Option B, "Mean time to respond," directly addresses the need to react swiftly once a security incident is detected.
upvoted 5 times
...
ChanceFreedom
1 year ago
Selected Answer: A
When stuck between A and B I would compare the outcome with having one working well and one working poorly. If you know you'll detect it, it can eventually br resolved. If you never detect it or 6 months later?...
upvoted 4 times
...
bettyboo
1 year, 1 month ago
Selected Answer: A
I go with A. Mean time to detect
upvoted 3 times
...
FT000
1 year, 1 month ago
Selected Answer: A
My vote is for A. We have to address the concern, which is the reporting of vulnerabilities (MTTD). The goal, which is reducing the time to allow for traversal, etc. (MTTR) depends heavily on how quickly the vulnerability is detected and reported to the CSIO/CSIRT.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago