exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 299 discussion

Actual exam question from CompTIA's CS0-002
Question #: 299
Topic #: 1
[All CS0-002 Questions]

A security analyst was transferred to an organization's threat-hunting team to track specific activity throughout the enterprise environment. The analyst must observe and assess the number of times this activity occurs and aggregate the results. Which of the following is the BEST threat-hunting method for the analyst to use?

  • A. Stack counting
  • B. Searching
  • C. Clustering
  • D. Grouping
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
NadeemRV
1 year, 9 months ago
Selected Answer: A
Stack counting is the BEST threat-hunting method for the analyst to use in this scenario. Stack counting involves tracking and counting the number of occurrences of specific events in logs, which can provide insights into trends and patterns of activity that may indicate a threat. This method can help to identify the frequency of the specific activity the analyst is tracking, allowing them to assess the level of risk and prioritize actions to mitigate the threat.
upvoted 1 times
...
kiduuu
1 year, 12 months ago
Selected Answer: A
Stack counting is a threat-hunting technique that involves monitoring a specific event or activity, counting the number of times it occurs, and then aggregating those results over time. This technique is useful for identifying patterns of behavior that may indicate a threat actor is active in the environment.
upvoted 2 times
...
AbusedInk
2 years ago
Selected Answer: A
Stacking, or stack counting, is a basic technique for identifying outliers in data. It involves counting the number of occurrences of a particular value, sorting them, and investigating the extreme outliers.
upvoted 1 times
...
db97
2 years, 2 months ago
"asses the number of times" is the hint here. With that being said the right answer is: "Stack counting" (A).
upvoted 3 times
2Fish
2 years, 1 month ago
Agree. this is a technique used in threat hunting to track specific activities across an organization's environment by counting the occurrence of a particular event over a span of time. It typically involves collecting logs and other data from various sources and analyzing them to identify the frequency and distribution of the activity in question.
upvoted 1 times
...
...
encxorblood
2 years, 2 months ago
Selected Answer: B
The BEST threat-hunting method for the analyst to use when tracking specific activity throughout the enterprise environment is searching. Therefore, option B is the correct answer. Searching is a threat-hunting method used to identify specific indicators of compromise (IOCs) or patterns in the environment that may indicate an ongoing attack. The security analyst can search for known IOCs or indicators of attack (IOAs) and then analyze the results to determine the extent and severity of the threat. In this scenario, the analyst must observe and assess the number of times a specific activity occurs and aggregate the results. Searching can be an effective method for identifying the occurrence of the activity in the environment and then aggregating the results to determine the scope of the threat.
upvoted 1 times
...
Cock
2 years, 2 months ago
Selected Answer: A
A. Stack counting is the BEST threat-hunting method for the analyst to use in this scenario. Stack counting involves tracking and counting the number of occurrences of specific events in logs, which can provide insights into trends and patterns of activity that may indicate a threat. This method can help to identify the frequency of the specific activity the analyst is tracking, allowing them to assess the level of risk and prioritize actions to mitigate the threat.
upvoted 1 times
...
jleonard_ddc
2 years, 2 months ago
Selected Answer: A
The analyst is just being asked to aggregate the activity (add up the number of occurences). It's clearly A. "Also known as stacking, this is one of the most common techniques carried out by hunters to investigate a hypothesis. Stacking involves counting the number of occurrences for values of a particular type, and analyzing the outliers or extremes of those results" The same site says of clustering "consists of separating groups (or clusters) of similar data based on characters out of a larger set of data. This is considered an unserpevised machine learning technique." Grouping is used to potentially find a particular TTP or tool that is in common to the data. https://github.com/OTRF/ThreatHunter-Playbook/blob/master/resources/HUNTING_TECHNIQUES.md
upvoted 2 times
...
gnnggnnggnng
2 years, 2 months ago
Selected Answer: C
Changing to C as the best threat-hunting method for the analyst to use would be clustering. Clustering is the process of grouping related events together, which can help identify patterns and anomalies that could indicate malicious activity. The analyst can use this information to focus their investigation and prioritize responses.
upvoted 1 times
...
gnnggnnggnng
2 years, 2 months ago
Selected Answer: A
A. Stack counting is the BEST threat-hunting method for the analyst to use in this scenario. Stack counting involves observing the number of times a specific activity occurs, aggregating the results, and analyzing the data for anomalies or patterns that may indicate a security threat. This method is effective for tracking specific activities and determining if they are occurring more frequently than expected, which can indicate a security breach.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago