exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 390 discussion

Actual exam question from CompTIA's CAS-004
Question #: 390
Topic #: 1
[All CAS-004 Questions]

A security analyst is reviewing the data portion acquired from the following command:

tcpdump -lnvi icmp and src net 192.168.1.0/24 and dst net 0.0.0.0/0 -w output.pcap

The data portion of the packet capture shows the following:



The analyst suspects that a data exfiltration attack is occurring using a pattern in which the last five digits are encoding sensitive information. Which of the following technologies and associated rules should the analyst implement to stop this specific attack? (Choose two.)

  • A. Intrusion prevention system
  • B. Data loss prevention
  • C. sed -e 's/a-z.*0-9.*//g'
  • D. reject icmp any any <> any any (msg:"alert"; regex [a-z]{26}[0-9]{5})
  • E. Second-generation firewall
  • F. drop icmp from 192.168.1.0/24 to 0.0.0.0/0
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
wizwiz
Highly Voted 1 year, 5 months ago
Selected Answer: AD
The regex expression is a exact match!
upvoted 6 times
...
041ba31
Highly Voted 11 months ago
Selected Answer: AD
The best solutions to implement to stop this specific attack are: A. Intrusion prevention system: An IPS can be configured to detect and block suspicious patterns of data, such as the specific exfiltration pattern identified here. D. reject icmp any any <> any any (msg:"alert"; regex [a-z]{26}[0-9]{5}): This rule uses a regular expression to match the pattern of 26 lowercase letters followed by 5 digits, which can be used to detect and reject packets containing the suspected encoded sensitive information.
upvoted 6 times
...
3041b53
Most Recent 3 months, 1 week ago
Selected Answer: AD
DLP tools are not (generally) designed to detect ICMP based data exfiltration.
upvoted 1 times
...
Bright07
3 months, 1 week ago
Selected Answer: AB
The best solutions are A. Intrusion prevention system and B. Data loss prevention, as these technologies can detect and prevent the data exfiltration attack by identifying and blocking the sensitive data transfer based on the described pattern.
upvoted 1 times
...
Bright07
3 months, 1 week ago
Selected Answer: AB
A. Intrusion prevention system (IPS) An IPS can monitor network traffic for suspicious patterns and malicious activity. By implementing the correct rules, it can detect and block attempts to exfiltrate data based on the pattern described (e.g., the last five digits encoding sensitive information). The IPS could potentially block the malicious traffic or alert the analyst when it matches a known pattern of data exfiltration. B. Data loss prevention (DLP) Data Loss Prevention (DLP) solutions are specifically designed to prevent the unauthorized transfer of sensitive data. In this case, DLP can be configured to look for specific patterns in the data, such as the last five digits in the payload encoding sensitive information, and prevent this data from being exfiltrated over the network.
upvoted 1 times
...
23169fd
9 months, 2 weeks ago
Selected Answer: AD
A. Intrusion Prevention System (IPS) Implement an IPS with a custom rule to detect and block the specific pattern in the data payload. The rule could use a regex pattern to match the last five digits. D. reject icmp any any <> any any (msg:"alert"; regex [a-z]{26}[0-9]{5}) This Snort rule (or a similar rule in another IPS) can detect ICMP packets with a specific pattern where 26 alphabetic characters are followed by 5 numeric digits. This rule will help in identifying and blocking the suspicious data exfiltration pattern. Justification:
upvoted 4 times
...
MacherGaming
9 months, 2 weeks ago
Selected Answer: AD
AD: D - A SNORT rule rejecting from any ip/port to any ip/port, either outbound or inbound ('<>') matching the RegEx. A - SNORT rules are not applied on a DLP, they are applied to NIPS.
upvoted 4 times
...
saucehozz
1 year ago
Selected Answer: AB
Maybe I'm overthinking this, but a Combo of A and B works well in this scenario: A) Configure DLP to identify and block the encoded data with the five-digit pattern from being transferred, regardless of protocol. B) Create an IPS rule to identify and block ICMP packets with a payload of 31 bytes (26 alpha and five numeric patterns) from the internal network.
upvoted 1 times
MacherGaming
9 months, 2 weeks ago
You are underthinking this... The question is looking for a technology and a rule. AB is listing two technologies.
upvoted 2 times
...
...
gpt_test
1 year, 2 months ago
Selected Answer: BD
B. Data loss prevention Brief Explanation: DLP systems can be configured to recognize and prevent the transfer of sensitive information based on patterns, like the last five digits in this scenario. D. Reject icmp any any <> any (msg:"alert"; regex: [a-z]{26}[0-9]{5}) Brief Explanation: This rule is written for a network-based intrusion prevention system (IPS). It uses a regular expression to match the pattern of 26 letters followed by 5 digits, which corresponds to the suspected data exfiltration pattern.
upvoted 2 times
armid
9 months, 3 weeks ago
and where do you configure D. if you already dont have A. A is a prerequisite to D. Also implementing A and D will already drop packets like this, making DLP redundant
upvoted 1 times
...
...
ElDirec
1 year, 2 months ago
Selected Answer: AD
A & D because it requires a technology along with a rule to be applied while using it. THe only rule I see is the one for an IPS. DLP would be good, but I don't see a rule that can be applied along with option B
upvoted 3 times
...
talosDevbot
1 year, 3 months ago
Selected Answer: AD
D is Snort rule with a regex expression that will prevent this attack While B is a viable answer, A is a better answer since it compliments D (Snort is an IPS)
upvoted 4 times
...
Potato42
1 year, 4 months ago
Selected Answer: BD
It's B and D: B is obvious and I think everyone can agree that a DLP would be ideal in such scenarios. The only dilemma is between A (IPS) and D, which is a very accurate Regex pattern that rejects any ICMP traffic between any sources and destinations that contain a specific pattern: 26 consecutive lowercase letters followed by 5 consecutive digits. This pattern already implies that there is an IPS in place, so it's more accurate than selecting A.
upvoted 3 times
...
Delab202
1 year, 4 months ago
Selected Answer: BD
To mitigate the data exfiltration attack, the analyst could implement Data Loss Prevention (DLP) technology with rules specifically targeting patterns involving the last five digits, preventing sensitive information from being encoded or leaked.
upvoted 2 times
...
OdinAtlasSteel
1 year, 4 months ago
Selected Answer: BD
B. Data loss prevention (DLP): DLP solutions are designed to identify, monitor, and protect sensitive data to prevent unauthorized access or transmission. By implementing DLP policies that specifically target and inspect traffic for patterns resembling the suspected data exfiltration (e.g., identifying the sensitive information format in the last five digits), the DLP system can block or alert on such transmissions. D. Intrusion prevention system (IPS): IPS solutions can be configured with rules and signatures to detect and prevent suspicious or malicious network activity. A custom signature or rule can be created within the IPS that specifically looks for the suspected pattern observed in the data portion of the captured packets. For instance, a signature similar to the provided regex pattern [a-z]{26}[0-9]{5} might be employed within the IPS to detect this specific data exfiltration attempt.
upvoted 2 times
BadgerTester
1 year, 4 months ago
the IPS is A, not D. Did you mean A?
upvoted 1 times
OdinAtlasSteel
1 year, 4 months ago
Sorry for the confusion. I think that you need to use the regex command to create a DLP rule. IPS is not correct. The question asks which technology and associated rule you should implement. The correct answers are B. DLP and D. (regex rule)
upvoted 2 times
OdinAtlasSteel
1 year, 4 months ago
In the context of the scenario where a specific pattern ("abcdefghijklmnopqrstuvwxyz[5 digits]") is suspected to be involved in the data exfiltration, a DLP solution can be configured with a rule using regex matching to actively monitor and prevent the transmission of this suspected sensitive information. DLP solutions offer a more targeted approach toward identifying and stopping data leakage based on specific data patterns. While an Intrusion Prevention System (IPS) is valuable in general network security for detecting and preventing various threats, including specific patterns in network traffic, a DLP solution is specifically tailored for identifying and preventing data leakage, making it more suitable for addressing the suspected data exfiltration attack based on the provided pattern.
upvoted 2 times
...
...
...
...
biggytech
1 year, 5 months ago
Selected Answer: AB
Answer is AB since D does not exactly match what is being exfiltrated. If D was correct then it should be AD based on the context of the question asking for a specific rule
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago