exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 80 discussion

Actual exam question from CompTIA's CS0-002
Question #: 80
Topic #: 1
[All CS0-002 Questions]

A security analyst identified one server that was compromised and used as a data mining machine, and a clone of the hard drive that was created. Which of the following will MOST likely provide information about when and how the machine was compromised and where the malware is located?

  • A. System timeline reconstruction
  • B. System registry extraction
  • C. Data carving
  • D. Volatile memory analysis
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Ryukendo
Highly Voted 2 years, 6 months ago
My Answer is A They are asking "provide information about when and how", How does Volatile Memory Analysis Will help here, Cause it only gives us information about how malware works it can't say when or how. On the other hand, TIMELINE RECONSTRUCTION gives us How was access to the system obtained? What tools have been installed? What changes to system files or applications have been made? What data has been retrieved? Is there evidence data was exfiltrated over the network or via attached storage?
upvoted 22 times
...
2Fish
Most Recent 2 years, 1 month ago
Selected Answer: A
A. A timeline will show the sequence of file system events within a source image and give you the ability to create a graphical representation of the events.
upvoted 1 times
...
boletri
2 years, 1 month ago
Selected Answer: A
Timeline Generation and Analysis When you have secured a copy of a forensic image, validated from the source by a cryptographic hash, you can start to analyze the information you have captured. The visual representation of events happening in chronological order is called a timeline, and it can be a powerful tool in your forensics toolkit. Being able to analyze a timeline will give you a holistic perspective of the incident that wouldn't otherwise be possible. For example, you can list files you find in a computer's web browser cache by their file name, date/time created, date/time last accessed, and date/time last modified. Comptia Cysa+ Course Material
upvoted 1 times
...
encxorblood
2 years, 2 months ago
Selected Answer: A
herefore, option A is the correct answer. System timeline reconstruction is the process of analyzing system logs, file system metadata, and other sources of information to create a timeline of events that occurred on the compromised machine. By reconstructing the timeline of events, the security analyst can identify the point of compromise, the actions taken by the attacker, and the extent of the compromise. This process can also help identify the location of any malware that may be present on the machine.
upvoted 1 times
...
absabs
2 years, 2 months ago
Selected Answer: A
I am consufing with A and D. Volatile memory analysis is not about with hard drive.... I am going with A.
upvoted 1 times
...
CyberNoob404
2 years, 3 months ago
Selected Answer: A
By the time a clone of the hard drive would be completed, volatile memory would have already been lost. To provide information about when and how the machine was compromised and where the malware is located using the CLONED HARD DRIVE, you would have to perform a system timeline reconstruction. You cannot do that with volatile memory that was never captured. Answer is A.
upvoted 3 times
...
Jeend
2 years, 3 months ago
Information security professionals conduct memory forensics to investigate and identify attacks or malicious behaviors that do not leave easily detectable tracks on hard drive data So D Correct
upvoted 1 times
...
IT_Master_Tech
2 years, 4 months ago
I don’t even find what system timeline reconstruction is…so I go with D.
upvoted 2 times
...
trojan123
2 years, 4 months ago
Selected Answer: A
⦿ Timeline Generation- Timeline- a tool that shows the sequence of file system events within a source image in a graphical format. Timelines can help the analyst understanding how access to the system was obtained, what tools were installed, what changes to files were made, what data was exfiltrated (if it was exfiltrated) and more. Many forecsic tools generate a timeline.
upvoted 4 times
...
lordguck
2 years, 4 months ago
C: As far as I remember, securing evidence it done from most fleeting media (memory) to the more stable ones. As a disk clone was created, a memory dump was saved before that. So the next step is to use data carving (memory dump & clone data).
upvoted 1 times
...
SolventCourseisSCAM
2 years, 5 months ago
Selected Answer: A
After some search on timeline reconstruction, the answer seems A. Also, I agree with Ryukendo's claim.
upvoted 2 times
...
forklord72
2 years, 5 months ago
From my understanding, volatile memory analysis is to gain knowledge about any malicious processes currently running and what it’s doing. From the question it seems the company already understands that the server was used for data mining. and I don’t believe volatile memory analysis is done on clones of the drive but the drive itself once confiscated. Could be wrong, but I think A is the right answer here
upvoted 1 times
...
gwanedm
2 years, 6 months ago
Because the question says "a clone of the hard drive was created" is excludes B and D. I would go with A because it gives date and time details
upvoted 1 times
Adrian831
2 years, 6 months ago
but how about "how the machine was compromised and where the malware is located?" The A gives that too? I don't think so. D is still valid here.
upvoted 1 times
ExamTopicsDiscussor
2 years, 6 months ago
Adrian, how would you find that IN VOLATILE MEMORY? You can MAYBE find the malware in memory, but do you think the malware has historical logs stored in its executable code? No, it doesn't.
upvoted 3 times
...
...
...
jchutch2
2 years, 6 months ago
Selected Answer: C
Definitely data carving
upvoted 2 times
Adrian831
2 years, 6 months ago
Definitely not C. D seems correct to me.
upvoted 1 times
...
...
R00ted
2 years, 6 months ago
Selected Answer: D
pulled from chegg Option D is correct Information security professionals conduct memory forensics to investigate and identify attacks or malicious behaviors that do not leave easily detectable tracks on hard drive data.
upvoted 4 times
...
sh4dali
2 years, 7 months ago
Selected Answer: D
I would have to say D. I looked through 3 different CySa books and only memory analysis makes sense. https://www.varonis.com/blog/memory-forensics
upvoted 2 times
...
nonjabusiness
2 years, 7 months ago
Not sure, but I think B is correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago