exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 194 discussion

Actual exam question from CompTIA's CS0-003
Question #: 194
Topic #: 1
[All CS0-003 Questions]

A laptop that is company owned and managed is suspected to have malware. The company implemented centralized security logging. Which of the following log sources will confirm the malware infection?

  • A. XDR logs
  • B. Firewall legs
  • C. IDS logs
  • D. MFA logs
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
glenndexter
Highly Voted 1 year ago
Selected Answer: A
Among the options provided, the log source that would most likely confirm the malware infection on the company-owned and managed laptop is: A. XDR logs XDR (Extended Detection and Response) logs aggregate and correlate data from various security sources, such as endpoint detection and response (EDR), network traffic analysis (NTA), and other security tools. These logs provide comprehensive visibility into security events and incidents across the organization's infrastructure. If the laptop is suspected to have malware, the EDR component of the XDR solution would likely generate logs indicating suspicious or malicious behavior on the endpoint. This could include activities such as file modifications, process executions, network connections to known malicious domains, or other indicators of compromise (IOCs) associated with malware infections.
upvoted 19 times
Iykbay
9 months ago
Thanks buddy! Means alot
upvoted 1 times
...
PatrickH
12 months ago
Just wanna say thanks for taking tjhe time to put in so many good, detailed answers.
upvoted 3 times
...
...
cy_analyst
Most Recent 6 months, 3 weeks ago
Selected Answer: A
XDR (Extended Detection and Response) is a security tool that collects and correlates data across multiple security layers, including endpoints, networks, and cloud environments. XDR logs would provide detailed insights into suspicious activities, such as malware behavior, process execution, and anomalous patterns on the laptop. These logs can help confirm the presence of malware by analyzing behaviors indicative of an infection.
upvoted 2 times
...
HL2020
1 year ago
Selected Answer: A
I would say A. The laptop could be outside of the company network and an IDS would not have any relevant logs. Only the XDR would have logs in that situation.
upvoted 3 times
...
Eduardoo7
1 year ago
Selected Answer: A
XDR - IDS has nothing to do with endpoints
upvoted 3 times
...
CyberJackal
1 year, 1 month ago
Selected Answer: A
This is XDR logs. XDR and EDR are sometimes interchangeable terms. IDS is traditionally associated with network traffic, and logs are typically collected from networking devices, not user workstations.
upvoted 3 times
...
Bogus1488
1 year, 1 month ago
Selected Answer: A
XDR - eXtended Detection and Response
upvoted 3 times
...
[Removed]
1 year, 1 month ago
Selected Answer: C
Intrusion Detection System (IDS) logs are specifically designed to monitor network traffic for suspicious or malicious activity. If the laptop is suspected to have malware, the IDS logs may capture network traffic associated with the malware's behavior, such as communication with command-and-control servers, attempts to exploit vulnerabilities, or unusual patterns of data transfer.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago