exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 338 discussion

Actual exam question from CompTIA's CAS-004
Question #: 338
Topic #: 1
[All CAS-004 Questions]

A security analyst is monitoring an organization's IDS and DLP systems for an alert indicating files were removed from the network. The files were from the workstation of an employee who was authenticated but not authorized to access the files. Which of the following should the organization do FIRST to address this issue?

  • A. Provide additional security awareness training.
  • B. Disable the employee's credentials until the issue is resolved.
  • C. Ask human resources to notify the employee that sensitive files were accessed.
  • D. Isolate the employee's network segment and investigate further.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Djonzi
1 week, 1 day ago
Selected Answer: B
Isolating the network segment may disrupt other legitimate users and operations unnecessarily. Disabling credentials is more targeted and effective.
upvoted 1 times
...
23169fd
9 months ago
Selected Answer: D
Containment: Isolating the network segment ensures that the employee cannot continue accessing sensitive files or exfiltrating data. Investigation: This allows the security team to investigate the incident thoroughly to understand what was accessed, how it was accessed, and whether any other systems or data were compromised. Mitigation: This step mitigates the risk of further unauthorized access while preserving the current state of the employee's workstation for forensic analysis.
upvoted 1 times
...
weaponxcel
1 year, 5 months ago
Selected Answer: D
D. Isolate the employee's network segment and investigate further. Isolate the employee's network segment and investigate further. This will help to prevent the employee from causing any further damage and will also help to identify the root cause of the issue.
upvoted 1 times
...
32d799a
1 year, 6 months ago
Selected Answer: D
D. Isolating the employee's network segment will prevent any further unauthorized access, file transfers, or potential damage while preserving evidence for an investigation. This immediate action ensures that while the investigation is ongoing, the potential threat is contained.
upvoted 2 times
...
CXSSP
1 year, 7 months ago
Selected Answer: D
D. Isolate the employee's network segment and investigate further. In this scenario, where an authenticated but unauthorized employee accessed files from their workstation, it is crucial to take immediate action to prevent any further unauthorized access or potential data exfiltration. The first step should be to isolate the employee's network segment. This will help contain any potential threat and prevent it from spreading further within the network. After isolation, a thorough investigation should be conducted to understand the extent of the unauthorized access, identify any potential data breaches, and determine if any further actions are necessary. This investigation may involve reviewing logs, examining the affected workstation, and possibly involving the appropriate authorities within the organization.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago