exam questions

Exam CAS-003 All Questions

View all questions & answers for the CAS-003 exam

Exam CAS-003 topic 1 question 98 discussion

Actual exam question from CompTIA's CAS-003
Question #: 98
Topic #: 1
[All CAS-003 Questions]

A breach was caused by an insider threat in which customer PII was compromised. Following the breach, a lead security analyst is asked to determine which vulnerabilities the attacker used to access company resources.
Which of the following should the analyst use to remediate the vulnerabilities?

  • A. Protocol analyzer
  • B. Root cause analysis
  • C. Behavioral analytics
  • D. Data leak prevention
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
D1960
3 years, 8 months ago
The question seems to go off in two different directions: 1. find the vulnerability. 2. fix the problem. Maybe the second sentence: "Following the breach, a lead security analyst is asked to determine which vulnerabilities the attacker used to access company resources." Is just a red herring? It has nothing to do with final question. Remove that sentence, and question makes more sense.
upvoted 3 times
...
destro
3 years, 9 months ago
He doesn't want to investigate why it happened, he wants to remediate it. It's DLP.
upvoted 1 times
...
infosec208
4 years ago
The crux of the question is this "Which of the following should the analyst use to remediate the vulnerabilities?" That's DLP. He's past root cause analysis and into remediation.
upvoted 1 times
...
Trap_D0_r
4 years, 1 month ago
DLP stands for Data *LOSS* Prevention. Data Leak Prevention is not a thing, doesn't exist. The answer is B.
upvoted 2 times
D1960
4 years, 1 month ago
Now I don't the correct answer is B. The question is deceptively worded. Then again, you are right about DLP. "security analyst is asked to determine which vulnerabilities . . . Which of the following should the analyst use to remediate the vulnerabilities?" The analyst being asked to "determine which vulnerabilities" is pointless statement - a red herring. The final question is: how does the analyst "remediate the vulnerabilities?" A root cause analysis does not *remediate* anything.
upvoted 2 times
...
vorozco
3 years, 1 month ago
B does not remediate.
upvoted 1 times
...
...
TheThreatGuy
4 years, 2 months ago
Should be data “loss” prevention.... which makes me even more so want to choose B. B is not wrong. Whether it’s the best answer, depends on the writer. But if it says “leak” on the test I definitely would rule it out.
upvoted 1 times
...
boblee
4 years, 2 months ago
ITS B. ._.
upvoted 1 times
...
CragShield
4 years, 2 months ago
D. DLP I want to pick B. but I don't believe that sufficiently answers the question insofar as providing remediation to the vulnerabilities.
upvoted 2 times
...
TheSkyMan
4 years, 2 months ago
DLP is for -preventing- the loss of data. Since the breach already happened, you should perform root cause analysis to find out what happened and make changes to stop it from happening again. The primary goal of using RCA is to analyze problems or events to identify: - What happened - How it happened - Why it happened… so that - Actions for preventing re-occurrence are developed https://des.wa.gov/services/risk-management/about-risk-management/enterprise-risk-management/root-cause-analysis
upvoted 3 times
D1960
3 years, 10 months ago
Again: ""Which of the following should the analyst use to **remediate** the vulnerabilities? RCA, of itself, does not remediate anything.
upvoted 1 times
...
...
justaguy90
4 years, 3 months ago
D. Data leak prevention I also want to say root cause analysis, but I believe DLP works here. DLP should actually stop this leak from occuring though, so I can see why root cause can also be a strong choice. https://www.jigsawacademy.com/blogs/cyber-security/data-leakage-prevention/#What-is-data-leakage-prevention? Below are the six data loss solution components that are normally implemented in data protection security policy. To secure the data in motion: Identifies the sensitive data sent violating the policy. To secure the endpoints: Endpoint checkpoints can block the attempts of communication concerning sensitive data. To secure the data at rest: Encryption, data retention, and access control policies are implemented. To secure the data in use: DLP systems will monitor the unauthorized activities of users either intentionally or not. To identify the data: Identifies which data needs to be blocked by ML or metadata. To detect the data leaks: DLP solutions installed will alert the staff on the data breach.
upvoted 2 times
...
D1960
4 years, 5 months ago
Maybe: B. Root cause analysis ? The analyst is asked to "determine which vulnerabilities the attacker used to access company resources." Data leak prevention will not do that. We know that it's an insider threat. Maybe it's just a crooked employee who is authorized to view the PII?
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago