New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA CAS-005 Exam - Topic 4 Question 18 Discussion

Actual exam question for CompTIA's CAS-005 exam
Question #: 18
Topic #: 4
[All CAS-005 Questions]

[Security Engineering and Cryptography]

A company recently experienced an incident in which an advanced threat actor was able to shim malicious code against the hardware static of a domain controller The forensic team cryptographically validated that com the underlying firmware of the box and the operating system had not been compromised. However, the attacker was able to exfiltrate information from the server using a steganographic technique within LOAP Which of the following is me b way to reduce the risk oi reoccurrence?

Show Suggested Answer Hide Answer
Suggested Answer: A

The scenario describes a sophisticated attack where the threat actor used steganography within LDAP to exfiltrate data. Given that thehardware and OS firmware were validated and found uncompromised, the attack vector likely exploited a network communication channel. To mitigate such risks, enforcing allow lists for authorized network ports and protocols is the most effective strategy.

Here's why this option is optimal:

Port and Protocol Restrictions: By creating an allow list, the organization can restrict communications to only those ports and protocols that are necessary for legitimate business operations. This reduces the attack surface by preventing unauthorized or unusual traffic.

Network Segmentation: Enforcing such rules helps in segmenting the network and ensuring that only approved communications occur, which is critical in preventing data exfiltration methods like steganography.

Preventing Unauthorized Access: Allow lists ensure that only predefined, trusted connections are allowed, blocking potential paths that attackers could use to infiltrate or exfiltrate data.

Other options, while beneficial in different contexts, are not directly addressing the network communication threat:

B . Measuring and attesting to the entire boot chain: While this improves system integrity, it doesn't directly mitigate the risk of data exfiltration through network channels.

C . Rolling thecryptographic keys used for hardware security modules: This is useful for securing data and communications but doesn't directly address the specific method of exfiltration described.

D . Using code signing to verify the source of OS updates: Ensures updates are from legitimate sources, but it doesn't mitigate the risk of network-based data exfiltration.


CompTIA SecurityX Study Guide

NIST Special Publication 800-41, 'Guidelines on Firewalls and Firewall Policy'

CIS Controls Version 8, Control 9: Limitation and Control of Network Ports, Protocols, and Services

Contribute your Thoughts:

0/2000 characters
Effie
2 months ago
Code signing is definitely a must for OS updates.
upvoted 0 times
...
Wilford
2 months ago
Rolling cryptographic keys seems a bit overkill for this.
upvoted 0 times
...
Britt
2 months ago
I think measuring the boot chain is more effective.
upvoted 0 times
...
Sina
3 months ago
Enforcing allow lists is a solid move!
upvoted 0 times
...
Elvera
3 months ago
Wait, they used steganography? That's wild!
upvoted 0 times
...
Xuan
3 months ago
Using code signing for OS updates was emphasized in our last practice exam. It definitely helps verify the integrity of updates, but I’m not sure if it addresses the specific steganographic technique used here.
upvoted 0 times
...
Broderick
3 months ago
Rolling cryptographic keys sounds familiar, but I can't recall how it directly relates to the incident. I feel like it might help, but it seems more like a reactive measure.
upvoted 0 times
...
Shasta
4 months ago
I think measuring and attesting to the entire boot chain is crucial. We discussed how it helps ensure that only trusted components are loaded, but I wonder if it would be effective against steganography.
upvoted 0 times
...
Veronika
4 months ago
I remember studying about network security controls, and enforcing allow lists seems like a solid approach to limit unauthorized access. But I'm not entirely sure if it's enough on its own.
upvoted 0 times
...
Sarah
4 months ago
The question is a bit tricky, but I think option D is the way to go. Verifying the source of OS updates through code signing could help prevent the attacker from introducing malicious code in the future, even if they found another way to exfiltrate data.
upvoted 0 times
...
Latrice
4 months ago
I'm leaning towards option B - measuring and attesting to the entire boot chain. If the attacker was able to compromise the hardware, even if the OS wasn't affected, that's a serious vulnerability that needs to be addressed.
upvoted 0 times
...
Taryn
4 months ago
Okay, let's see. Since the attacker used steganography, I'm guessing the best approach would be to focus on network monitoring and controlling authorized protocols, like option A suggests. That seems like the most direct way to address the steganography risk.
upvoted 0 times
...
Sheldon
4 months ago
Hmm, I'm a bit confused by the details here. The question mentions a "shim" attack on the hardware, but the forensics team didn't find any issues with the firmware or OS. I'll need to think this through carefully.
upvoted 0 times
...
Chuck
5 months ago
This question seems pretty straightforward. I think the key is to focus on reducing the risk of the attacker using steganography to exfiltrate data, since the underlying system wasn't compromised.
upvoted 0 times
...
Mel
5 months ago
I see both points, but I think option B) Measuring and attesting to the entire boot chain could also be a good approach to enhance security.
upvoted 0 times
...
Laurel
5 months ago
Rolling the crypto keys for hardware security modules? Sounds like a good way to keep those bad guys out of our hardware.
upvoted 0 times
...
Bettye
5 months ago
I disagree, I believe option D) Using code signing to verify the source of OS updates is more effective in preventing similar incidents.
upvoted 0 times
...
Vernice
5 months ago
I think option A) Enforcing allow lists for authorized network ports and protocols is the best way to reduce the risk of reoccurrence.
upvoted 0 times
...
Cassie
6 months ago
Code signing to verify OS updates? That's a no-brainer. Gotta keep those updates squeaky clean, you know?
upvoted 0 times
Viola
5 months ago
A) Enforcing allow lists for authorized network ports and protocols
upvoted 0 times
...
...
Clemencia
7 months ago
Hmm, measuring and attesting to the entire boot chain seems like the way to go. Can't let those sneaky attackers slip through the cracks!
upvoted 0 times
Ricarda
5 months ago
A: Enforcing allow lists for authorized network ports and protocols sounds like a good idea too.
upvoted 0 times
...
...

Save Cancel