exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 499 discussion

Actual exam question from CompTIA's CAS-004
Question #: 499
Topic #: 1
[All CAS-004 Questions]

A security analyst is conducting an investigation regarding a potential insider threat. An unauthorized USB device might have been used to exfiltrate proprietary data from a Linux system.

Which of the following options would identify the IoCs and provide the appropriate response?

  • A. Review the network logs and update the firewall rules.
  • B. Review the operating system logs and update the DLP rules.
  • C. Review the vulnerability logs and update the IDS rules.
  • D. Obtain the device ID using dmesg and update the portable storage inventory.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bright07
3 weeks, 1 day ago
Selected Answer: D
The correct option in this case is D. Obtain the device ID using dmesg and update the portable storage inventory. In this scenario, the security analyst is investigating a potential insider threat involving the use of an unauthorized USB device to exfiltrate proprietary data. The primary focus should be on identifying the USB device used for the exfiltration and taking steps to track it. dmesg: On Linux systems, dmesg is a command used to view the kernel's log messages, which can provide information about newly connected hardware devices, including USB devices. By using dmesg, the analyst can check the logs for entries related to the connection of the unauthorized USB device, including the device ID, which is critical for identifying and tracking the device. Updating the portable storage inventory: Once the device is identified, it’s important to update the inventory to keep track of all connected and authorized USB devices. This can help ensure only approved devices are used and that unauthorized devices can be flagged for future incidents.
upvoted 1 times
...
a18733c
1 month, 3 weeks ago
Selected Answer: B
B is the stronger answer as you can leverage logs to identify the device, and determine what other actions occurred on the system. That and the approach of updating an inventory vs. updating DLP rules is arguably less effective for responding to an event that already happened.
upvoted 1 times
...
Bright07
3 months, 2 weeks ago
Ans D. The best option for identifying the Indicators of Compromise (IoCs) and providing an appropriate response in the context of a potential insider threat involving an unauthorized USB device would be: D. Obtain the device ID using dmesg and update the portable storage inventory. This approach directly addresses the investigation by identifying the specific USB device used, allowing for further analysis and action regarding its usage and potential data exfiltration.
upvoted 3 times
...
SangSang
4 months, 3 weeks ago
Selected Answer: D
I would say it is D. B isn't direct prevent the problem which already exfiltrated
upvoted 3 times
...
tony_wang99
5 months, 1 week ago
Selected Answer: B
B. Review the operating system logs and update the DLP rules. This will help identify the use of unauthorized USB devices and implement measures to prevent data exfiltration.
upvoted 4 times
...
EAlonso
5 months, 3 weeks ago
Selected Answer: B
Data visibility and endpoint DLP can secure data at-rest and ensure that users do not exfiltrate data via a removable device, such as a USB. The exercise does not specify if the DLP is a network or endpoint based.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago