Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CAS-005 Topic 4 Question 18 Discussion

Actual exam question for CompTIA's CAS-005 exam
Question #: 18
Topic #: 4
[All CAS-005 Questions]

[Security Engineering and Cryptography]

A company recently experienced an incident in which an advanced threat actor was able to shim malicious code against the hardware static of a domain controller The forensic team cryptographically validated that com the underlying firmware of the box and the operating system had not been compromised. However, the attacker was able to exfiltrate information from the server using a steganographic technique within LOAP Which of the following is me b way to reduce the risk oi reoccurrence?

Show Suggested Answer Hide Answer
Suggested Answer: A

The scenario describes a sophisticated attack where the threat actor used steganography within LDAP to exfiltrate data. Given that thehardware and OS firmware were validated and found uncompromised, the attack vector likely exploited a network communication channel. To mitigate such risks, enforcing allow lists for authorized network ports and protocols is the most effective strategy.

Here's why this option is optimal:

Port and Protocol Restrictions: By creating an allow list, the organization can restrict communications to only those ports and protocols that are necessary for legitimate business operations. This reduces the attack surface by preventing unauthorized or unusual traffic.

Network Segmentation: Enforcing such rules helps in segmenting the network and ensuring that only approved communications occur, which is critical in preventing data exfiltration methods like steganography.

Preventing Unauthorized Access: Allow lists ensure that only predefined, trusted connections are allowed, blocking potential paths that attackers could use to infiltrate or exfiltrate data.

Other options, while beneficial in different contexts, are not directly addressing the network communication threat:

B . Measuring and attesting to the entire boot chain: While this improves system integrity, it doesn't directly mitigate the risk of data exfiltration through network channels.

C . Rolling thecryptographic keys used for hardware security modules: This is useful for securing data and communications but doesn't directly address the specific method of exfiltration described.

D . Using code signing to verify the source of OS updates: Ensures updates are from legitimate sources, but it doesn't mitigate the risk of network-based data exfiltration.


CompTIA SecurityX Study Guide

NIST Special Publication 800-41, 'Guidelines on Firewalls and Firewall Policy'

CIS Controls Version 8, Control 9: Limitation and Control of Network Ports, Protocols, and Services

Contribute your Thoughts:

Cassie
24 hours ago
Code signing to verify OS updates? That's a no-brainer. Gotta keep those updates squeaky clean, you know?
upvoted 0 times
...
Clemencia
8 days ago
Hmm, measuring and attesting to the entire boot chain seems like the way to go. Can't let those sneaky attackers slip through the cracks!
upvoted 0 times
...

Save Cancel