exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 27 discussion

Actual exam question from CompTIA's CAS-004
Question #: 27
Topic #: 1
[All CAS-004 Questions]

While investigating a security event, an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were encrypted by ransomware that is demanding payment within 48 hours or all data will be destroyed. The company has no response plans for ransomware.
Which of the following is the NEXT step the analyst should take after reporting the incident to the management team?

  • A. Pay the ransom within 48 hours.
  • B. Isolate the servers to prevent the spread.
  • C. Notify law enforcement.
  • D. Request that the affected servers be restored immediately.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
patinho777
Highly Voted 7 months ago
Selected Answer: B
I think that isolating the network comes before notifying law enforcement.
upvoted 10 times
dangerelchulo
2 years, 9 months ago
That would be correct but analysts do not hold the job to do the isolation, he notified management to do so. Question ask about analyst next step only possible answer is notify law enforcement. Read the question carefully
upvoted 4 times
SallySausage
9 months, 3 weeks ago
Wrong. Analysts don't choose how the business responds to incidents, management does. If a security analyst at a company notifies law enforcement without their supervisor's direct say so, they are getting fired.
upvoted 1 times
...
...
...
blacksheep6r
Most Recent 2 months, 2 weeks ago
Selected Answer: B
Why B is the Best Answer? ✔ Stops the spread – Ransomware often spreads laterally across the network. ✔ Prevents further encryption of files & backups – Keeping infected systems online risks more damage. ✔ Preserves forensic evidence – If properly isolated, analysts can investigate without the malware executing further.
upvoted 2 times
...
[Removed]
10 months, 2 weeks ago
Selected Answer: B
B is correct
upvoted 1 times
...
SangSang
11 months, 1 week ago
Selected Answer: B
I vote B, for anyone who concern about the Analyst role, check the question number 38, it still Analyst but all about technical actions.
upvoted 1 times
...
Anarckii
1 year, 4 months ago
Selected Answer: B
Isolate, report, negotiate if last resort with law enforcement involved
upvoted 1 times
...
joinedatthehop
1 year, 7 months ago
I agree with DangerElChulo on this one. The answer should be C. The key word here is Analyst. While it would be common sense to isolate first, this is not the analysts job.
upvoted 1 times
joinedatthehop
1 year, 7 months ago
This is a classic CompTIA mind bender as isolation should 100% be the first step. The confusion comes in when we take into consideration the job duty of the person being talked about in the question is "Analyst".
upvoted 1 times
...
...
BiteSize
1 year, 9 months ago
Selected Answer: B
From the analyst's perspective, the Cybersecurity Incident Response Team (CSIRT) handles the incident directly. Notifying management after detection and initial triage have taken place already is a no-brainer. Then, the next step for the analyst would be to reduce the impact on the network by isolating infected machines. Management would notify law enforcement or a Cyber Protection Team (CPT) to clear, hunt, and harden the network. Source: Verifying against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 3 times
...
kycugu
2 years, 4 months ago
C is the correct answers
upvoted 2 times
...
Andre876
2 years, 5 months ago
I believe it is B. it would be best to isolate the servers first to prvent further spread as well as to to prevent the attacker from making changes to the system before the police arrives.
upvoted 1 times
...
tineboy46
2 years, 6 months ago
C is the correct pick. key word is (Analyst)
upvoted 1 times
...
Boats
2 years, 8 months ago
Selected Answer: B
No IT employee would ever contact LE without going through management. Even and IT director or CIO would not do that without approval of a CEO/Board approval. Also, FBI would not respond if the value was under a certain amount.
upvoted 3 times
dangerelchulo
2 years, 8 months ago
an Analyst also has no admin right, otherwise the question would had stated that what the sys admin or management team next step. Also given that analyst job is to review the event ant take appropriate action 1 notify management to isolate 2 report legal since company has no due process for incident 3 after report restore servers. If there are more steps than that let me know. step 1 completed next step is 2
upvoted 1 times
...
...
dangerelchulo
2 years, 9 months ago
Selected Answer: C
The analyst does not manage the system, that is why he notified the management team to do the isolation. Analyst only next possible step is to notify law enforcement. So C is the correct answer. Always read the whole question they are tricky, Big_Harambe was on the right path as well.
upvoted 2 times
dangerelchulo
2 years, 7 months ago
I was wrong it is isolation.
upvoted 4 times
...
...
Big_Harambe
2 years, 10 months ago
The company has no response plans for ransomware - therefore they have no plan to isolate the servers.
upvoted 3 times
...
RevZig67
2 years, 11 months ago
Selected Answer: B
I think isolating the servers
upvoted 2 times
...
dgfhyjfghfgfkfhd
3 years ago
Isolating first makes much better real-world sense. While you're on the phone with detective Derp, all your corporate data is probably getting tunneled to Taiwan. Quarantine, then call the cops...
upvoted 1 times
...
zapato
3 years, 2 months ago
Selected Answer: B
I think It is B. Damage has to be minimize first and that is achieved isolating the servers
upvoted 2 times
...
BlackdaRipper
3 years, 2 months ago
This answer is correct. The question mentions the servers were attacked. You can't assume the attack was for any other service or device. So if it is isolated to the servers, the next thing would be notifying law enforcement to begin forensics.
upvoted 1 times
BlessedChild
3 years, 1 month ago
A group of servers, that means not all servers were affected. It’s best to avoid more damages. So isolating the servers that aren’t yet affected should be the first move then you can go ahead and inform your law enforcement department.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago