Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CAS-004 Topic 3 Question 71 Discussion

Actual exam question for CompTIA's CAS-004 exam
Question #: 71
Topic #: 3
[All CAS-004 Questions]

A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.

The technician will define this threat as:

Show Suggested Answer Hide Answer
Suggested Answer: B

File hashing is used to create a digital fingerprint of files to detect unauthorized changes. By comparing the hash values before and after analysis, the integrity of the files can be validated. This aligns with CASP+ objective 5.2, which includes forensic evidence integrity and validation methods.


Contribute your Thoughts:

Chi
1 days ago
I'm not sure it's an APT. The question doesn't mention any specific vulnerability or attack technique. It could just be a broader data exfiltration incident.
upvoted 0 times
...
Jospeh
8 days ago
This sounds like a classic advanced persistent threat (APT) to me. The long duration, targeted file transfers, and use of encrypted channels are all hallmarks of an APT.
upvoted 0 times
...
Lettie
11 days ago
I'm not sure, but it could also be a zero-day attack since it seems like a new and unknown threat.
upvoted 0 times
...
Kimbery
12 days ago
I agree with Latrice, the activity over three months and then suddenly stopping seems like an advanced persistent threat.
upvoted 0 times
...
Latrice
13 days ago
I think the threat is an advanced persistent threat.
upvoted 0 times
...

Save Cancel