exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 96 discussion

Actual exam question from CompTIA's CS0-002
Question #: 96
Topic #: 1
[All CS0-002 Questions]

A cybersecurity analyst is supporting an incident response effort via threat intelligence. Which of the following is the analyst MOST likely executing?

  • A. Requirements analysis and collection planning
  • B. Containment and eradication
  • C. Recovery and post-incident review
  • D. Indicator enrichment and research pivoting
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Obi_Wan_Jacoby
Highly Voted 4 years, 3 months ago
Gather intelligence on threats is always part of the preparation phase which includes requirements analysis etc. Answer A looks correct. https://digitalguardian.com/blog/five-steps-incident-response
upvoted 14 times
Obi_Wan_Jacoby
4 years, 3 months ago
Threat feeds/sources (like plug-ins for IDS/IPS etc) give you the threat data you need to make sure you are up to date on your defense. This is always at the beginning as you want it in place and as updated as possible.
upvoted 3 times
...
SrGhost
3 years, 7 months ago
The issue is that we have an ongoing incident, at which point we have to do post-incident recovery and review. correct answer: C If there was no incident, then the answer would be A.
upvoted 5 times
forest111
2 years, 4 months ago
but there isn't any incident, question says "incident response effort", it could mean whole incident response generally. Am I correct?
upvoted 3 times
...
...
...
SniipZ
Highly Voted 3 years, 10 months ago
A -> This is the first phase of intelligence life cycle not incident response life cycle B -> Does not make sense C -> This sounds correct but I feel like recovery and threat intelligence does not fit so well together D -> These terms are not common in cybersec Final Answer: C
upvoted 9 times
hloq015
3 years, 9 months ago
the question stated via threat intelligence. So, it makes sense with the answer A
upvoted 1 times
VinciTheTechnic1an
3 years, 6 months ago
If you have access to CompTia Self pace Reader. You will find the Threat Intelligence is supporting Collection, in particular.
upvoted 1 times
...
...
...
yanyan20
Most Recent 1 year, 11 months ago
Selected Answer: D
The cybersecurity analyst is MOST likely executing indicator enrichment and research pivoting during the incident response effort via threat intelligence. This involves gathering additional information and context on identified indicators of compromise (IOCs), such as IP addresses, domains, hashes, and other artifacts, to gain insight into the threat actor's tactics, techniques, and procedures (TTPs) and possible attribution. By enriching IOCs with open-source and proprietary intelligence sources and pivoting across different data sets, the analyst can generate new leads, prioritize the investigation, and improve the detection and prevention capabilities. The other options listed (requirements analysis and collection planning, containment and eradication, and recovery and post-incident review) are also part of the incident response process, but they are not specifically related to the use of threat intelligence.
upvoted 1 times
...
2Fish
2 years, 1 month ago
Me thinks the most likely is D. It's asking what the analyst is 'executing" Indicator enrichment = gathering IOCs to better understand its relevance to the IR and its impact. research pivoting - using information gained from one area of research and pivot to another area for more investigation.
upvoted 1 times
...
Cock
2 years, 2 months ago
In the context of incident response, threat intelligence refers to the collection and analysis of information about potential security threats. The analyst is likely executing indicator enrichment and research pivoting, which involves collecting and analyzing information about potential security threats and using that information to identify other related threats. This may involve using tools such as threat intelligence platforms, malware sandboxes, and open-source intelligence (OSINT) sources to gather and analyze data. The goal is to improve the understanding of the threat and identify any potential indicators of compromise that can be used to contain and eradicate the threat. Requirements analysis and collection planning involve identifying the information that is needed to support an incident response effort. Containment and eradication involve taking steps to prevent the threat from spreading and remove it from the system or network. Recovery and post-incident review involve restoring normal operations and conducting a review of the incident to identify lessons learned and areas for improvement.
upvoted 1 times
...
jleonard_ddc
2 years, 3 months ago
Selected Answer: D
It's definitely D but it seems like many of you are confused over why. Remember the question asks what the analyst is doing (or, in other words - how is threat intelligence benefiting the IR effort?) A -> These are the first phases of the Intelligence lifecycle, not an incident response effort B -> These phases come after we've identified the threat; it's this identification which threat intelligence supports C -> Post-incident activities are where we identify what can be improved based on what happened during the incident D -> This is the answer, because it's what the threat intelligence is actually benefiting us. It is going to give us better indicators of compromise to narrow on that could help us pivot our research (think the OODA loop) in the right direction. For those who mentioned the preparation phase of IR, this is where we develop hardening, carry out training / exercises, establish procedures - essentially do everything we can to be ready for the big moment.
upvoted 5 times
...
kmanb
2 years, 3 months ago
Selected Answer: D
During an incident response effort, threat intelligence is used to gather information about the incident and the attackers involved. The cybersecurity analyst's role in this process would involve gathering and analyzing data, such as IP addresses, domain names, and malware samples, in order to identify and track the attackers. This process is known as indicator enrichment and research pivoting. It falls under the category of information gathering and analysis, as opposed to implementing security controls, incident containment, and incident recovery.
upvoted 3 times
...
CyberNoob404
2 years, 3 months ago
Selected Answer: A
Going with A because I've never heard of D.
upvoted 1 times
...
SolventCourseisSCAM
2 years, 5 months ago
Selected Answer: D
supporting incident response with threat intelligence actually provides enrichment on incident and pivoting on research.
upvoted 3 times
...
TheStudiousPeepz
2 years, 5 months ago
Selected Answer: A
The others don't make sense, thus it's A
upvoted 1 times
...
[Removed]
2 years, 6 months ago
I'm thinking that it is A. I did some research on indicator enrichment and to me it sounds like part of the requirements analysis and collection(IoC threat intelligence gathering).
upvoted 1 times
...
[Removed]
2 years, 6 months ago
Wouldn't D be incorporated as part of A? .
upvoted 1 times
...
EVE12
2 years, 7 months ago
Key Objectives at Each Phase of the Threat Intelligence Lifecycle Planning and direction: Set the scope and objectives for core intel roles and processes. Collection: Deploy data gathering and processing techniques and sources. Analysis: Translate raw intel into meaningful and taxonomized actors, events, and attributes. Production: Assess intel significance and severity based on business and environmental context. Dissemination and feedback: Report on finished intel, considering urgency and confidentiality.
upvoted 1 times
...
Laudy
2 years, 7 months ago
I personally think it's D. but every other test dump site says A.... idk...
upvoted 1 times
...
miabe
2 years, 9 months ago
Selected Answer: A
looks good to me
upvoted 1 times
...
MacherGaming
2 years, 10 months ago
The question states this is part of an incident response. There's only one phase of the Threat Intelligence Lifecycle that occurs post-event, phase 6 - Feedback. This is where we reanalyze our intelligence and decide if our alerts (indicators) are working effectively and if we should redirect (pivot) our assets/research. I've voting D.
upvoted 3 times
...
Xyz_40
3 years, 1 month ago
A goes to explain better
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago