exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 202 discussion

Actual exam question from CompTIA's CS0-003
Question #: 202
Topic #: 1
[All CS0-003 Questions]

A security analyst has received an incident case regarding malware spreading out of control on a customer's network. The analyst is unsure how to respond. The configured EDR has automatically obtained a sample of the malware and its signature. Which of the following should the analyst perform next to determine the type of malware based on its telemetry?

  • A. Cross-reference the signature with open-source threat intelligence.
  • B. Configure the EDR to perform a full scan.
  • C. Transfer the malware to a sandbox environment.
  • D. Log in to the affected systems and run netstat.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
gomet2000
Highly Voted 4 months, 4 weeks ago
Selected Answer: A
If the security analyst already has a sample of the malware and its signature, cross-referencing the signature with open-source threat intelligence could indeed be a more efficient next step. This would allow the analyst to quickly identify the malware by comparing it to known threats in threat intelligence databases, saving time and potentially providing immediate insights into the type of malware, its behavior, and mitigation strategies.
upvoted 8 times
Freshly
2 months ago
In comparison to C, I agree. Open source CVE and CVSS feeds could let us know quicker. Time is of importance as there is likely an SLA depicting the mean time to remediate.
upvoted 1 times
...
...
8a5dd39
Highly Voted 6 months, 3 weeks ago
Selected Answer: A
Both A and C are good choices, My reasoning for choosing A is because of the question Talking about malware signatures.
upvoted 7 times
...
An381038
Most Recent 1 week, 4 days ago
Selected Answer: C
Transferring the malware to a sandbox environment allows the analyst to safely observe its behavior, functionality, and characteristics in an isolated setting. This provides insights into the malware type and its impact, such as whether it is a worm, ransomware, or other type of malicious software.
upvoted 1 times
...
twent1
3 months, 3 weeks ago
The questions is unclear. I was a big fan of C. But I changed my answer to A, just because it's not talking about the infected machine but the malware. The isolated machine need to be isolated, I believe this question is just talking about the malware, if the malware signature is already captured, simply doing A.
upvoted 2 times
twent1
3 months, 3 weeks ago
the infected* machine
upvoted 1 times
...
...
dude2f4
4 months, 1 week ago
i would go with just because youre trying to find out what type of malware it is. You run it in a sandbox to see how it acts. OSINT will give you information in most cases unless you are the first to see this malware... if you are the first... good luck.
upvoted 1 times
...
SussyBoi842
4 months, 1 week ago
Selected Answer: A
Y'all convinced me it's A
upvoted 2 times
...
voiddraco
4 months, 2 weeks ago
I'll choose A as well. I was leaning to D at first but I read about it. So since the EDR has already collected telemetry and a signature, cross-referencing it with threat intelligence is quicker.
upvoted 2 times
dude2f4
4 months, 1 week ago
never log into a system that is or is possibly compromised. your credentials may get compromised as well. D will never be a good option.
upvoted 2 times
...
...
Myfeedins479
4 months, 4 weeks ago
Selected Answer: A
I'm sticking with a here. By definition, telemetry is the automatic recording and transmission of data from remote or inaccessible sources to an IT system in a different location for monitoring and analysis. Based on this definition, the telemetry has been completed by the EDR. It will be much quicker and easier to figure what type of malware it is by uploading the captured signatures to an open source such as VirusTotal than to try and figure it out yourself in a sandbox.
upvoted 5 times
...
CountVlad
6 months, 2 weeks ago
Selected Answer: A
Seems more logic and les time consuming to me...
upvoted 4 times
...
Kmelaun
8 months, 4 weeks ago
Selected Answer: C
Both A and C are great, but like jjkylin said we would go with sandboxing here because of the key word "telemetry" which means we are going to monitor the malware.
upvoted 6 times
...
jjkylin
9 months ago
Selected Answer: C
Both options A and C are valid approaches, but option C is more directly focused on analyzing the behavior of the malware, which aligns with the goal of determining the type of malware based on its telemetry.
upvoted 4 times
...
section8santa
9 months, 1 week ago
Selected Answer: A
Cross-referencing with Open-source Threat Intelligence: This approach involves comparing the malware signature obtained by the EDR (Endpoint Detection and Response) system with existing databases and sources of known malware signatures. Open-source threat intelligence platforms often have extensive databases of malware signatures, behaviors, and attributes. By comparing the obtained signature with these databases, the analyst can quickly identify the type of malware, understand its characteristics, and learn about its typical behaviors and impact. This knowledge is crucial for formulating an effective response strategy.
upvoted 5 times
...
Franky30
10 months, 1 week ago
Selected Answer: C
A sandbox is an isolated and controlled environment where the malware can be executed without affecting the production network. Analyzing the behavior of the malware in a sandbox allows the analyst to observe its actions, interactions, and potential impact on the system, providing valuable telemetry data.
upvoted 2 times
...
Man001
10 months, 1 week ago
Selected Answer: C
To determine the type of malware based on its telemetry, the security analyst should transfer the malware to a controlled environment like a sandbox. In question it is saying unsure about how to respond.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago