New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA CAS-005 Exam - Topic 1 Question 3 Discussion

Actual exam question for CompTIA's CAS-005 exam
Question #: 3
Topic #: 1
[All CAS-005 Questions]

A company detects suspicious activity associated with external connections Security detection tools are unable to categorize this activity. Which of the following is the best solution to help the company overcome this challenge?

Show Suggested Answer Hide Answer
Suggested Answer: D

User and Entity Behavior Analytics (UEBA) is the best solution to help the company overcome challenges associated with suspicious activity that cannot be categorized by traditional detection tools. UEBA uses advanced analytics to establish baselines of normal behavior for users and entities within the network. It then identifies deviations from these baselines, which may indicate malicious activity. This approach is particularly effective for detecting unknown threats and sophisticated attacks that do not match known indicators of compromise (IoCs).


Contribute your Thoughts:

0/2000 characters
Rodolfo
3 months ago
Monitoring the dark web could provide some insights too, though!
upvoted 0 times
...
Dyan
3 months ago
Wait, can honeypots even handle sophisticated attacks?
upvoted 0 times
...
Candida
3 months ago
Not so sure about that, mapping traffic to known IoCs seems more effective.
upvoted 0 times
...
Benton
4 months ago
Definitely agree, honeypots can really help catch the bad guys!
upvoted 0 times
...
Sheldon
4 months ago
I think implementing an interactive honeypot is a solid choice.
upvoted 0 times
...
Amber
4 months ago
Implementing UEBA could be useful since it analyzes user behavior, but I feel like I need more context to choose confidently.
upvoted 0 times
...
Sunshine
4 months ago
Monitoring the dark web sounds relevant, but I’m not convinced it would directly address the suspicious activity we're seeing.
upvoted 0 times
...
Gilma
4 months ago
I think mapping network traffic to known IoCs could help identify the suspicious activity. It seems like a solid approach.
upvoted 0 times
...
Luis
5 months ago
I remember studying honeypots, but I'm not sure if an interactive one is the best choice here.
upvoted 0 times
...
Jaime
5 months ago
Mapping network traffic to known IoCs could be a good approach, but I'm not fully confident that's the optimal solution here.
upvoted 0 times
...
Justine
5 months ago
Implementing UEBA seems like the best solution to help the company overcome the challenge of categorizing the suspicious activity.
upvoted 0 times
...
Dalene
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to think through the different options carefully.
upvoted 0 times
...
Verona
5 months ago
This question seems straightforward, but I want to make sure I understand the key details before selecting an answer.
upvoted 0 times
...
Alyce
1 year ago
Option D, no doubt. It's like having a security guard that never sleeps and can spot the slightest suspicious activity. Plus, it's probably more effective than staring at the dark web all day.
upvoted 0 times
...
Svetlana
1 year ago
UEBA all the way! Monitoring user behavior is the key to staying one step ahead of those pesky hackers. Now, where's my tin foil hat?
upvoted 0 times
Reyes
1 year ago
I agree, UEBA is a powerful tool in detecting and preventing security threats. It's important to stay proactive in protecting our network.
upvoted 0 times
...
Laine
1 year ago
UEBA is definitely the way to go. Monitoring user behavior can help us catch any suspicious activity before it becomes a problem.
upvoted 0 times
...
...
Lemuel
1 year ago
I think mapping network traffic to known IoCs could also be a good solution to overcome this challenge.
upvoted 0 times
...
Rasheeda
1 year ago
I disagree, I believe monitoring the dark web would be more effective in this situation.
upvoted 0 times
...
Delfina
1 year ago
Mapping network traffic to known IoCs is a good start, but it might not catch everything. Gotta keep an eye on that dark web too.
upvoted 0 times
Kanisha
1 year ago
D: Implement UEBA
upvoted 0 times
...
Simona
1 year ago
C: Monitor the dark web
upvoted 0 times
...
Jaime
1 year ago
B: Map network traffic to known IoCs.
upvoted 0 times
...
Kerrie
1 year ago
A: Implement an Interactive honeypot
upvoted 0 times
...
...
Cecilia
1 year ago
I think the best solution is to implement an Interactive honeypot.
upvoted 0 times
...
Dorothy
1 year ago
Ooh, a honeypot could be fun! Lure those hackers in and see what they're up to. But I guess UEBA is the more practical choice.
upvoted 0 times
Julie
1 year ago
C: Monitoring the dark web could also give us valuable insights into the suspicious activity.
upvoted 0 times
...
Marnie
1 year ago
B: I agree, but UEBA might be a more practical solution in the long run.
upvoted 0 times
...
Gracia
1 year ago
A: Let's set up a honeypot and catch those hackers in the act!
upvoted 0 times
...
...
Dong
1 year ago
Option D seems like the way to go. UEBA can help identify unusual user behavior and detect potential threats.
upvoted 0 times
Suzan
1 year ago
It's important for companies to stay proactive in monitoring user behavior to prevent potential security incidents.
upvoted 0 times
...
Launa
1 year ago
Implementing UEBA can definitely enhance the company's security posture and improve threat detection capabilities.
upvoted 0 times
...
Youlanda
1 year ago
I agree, UEBA can provide valuable insights into user activities and help prevent security breaches.
upvoted 0 times
...
Cyndy
1 year ago
Option D seems like the way to go. UEBA can help identify unusual user behavior and detect potential threats.
upvoted 0 times
...
...

Save Cancel