CAS-004 Exam QuestionsBrowse all questions from this exam

CAS-004 Exam - Question 199


A security analyst discovered that a database administrator's workstation was compromised by malware. After examining the logs, the compromised workstation was observed connecting to multiple databases through ODBC. The following query behavior was captured:

Assuming this query was used to acquire and exfiltrate data, which of the following types of data was compromised, and what steps should the incident response plan contain?

Show Answer
Correct Answer: D

The query is designed to match strings that conform to a specific pattern, which appears as four sets of four digits separated by hyphens. This format is characteristic of a Primary Account Number (PAN), commonly found on credit cards and similar payment cards. When PAN data is compromised, it is crucial to inform the legal department as it likely involves regulatory and compliance issues. Additionally, monitoring for this data on dark web marketplaces is critical to detect and respond to potential misuse. Therefore, the correct answer is that PAN data was compromised, and the incident response plan should include informing the legal department and monitoring the dark web for this data.

Discussion

6 comments
Sign in to comment
FoxTrotDGOption: D
Mar 1, 2023

PAN is referring to a primary account number, which is associated with payment cards, like debit and credit cards. Also, the regular expression matches a string of digits that is formatted like a credit card number (four sets of four digits separated by hyphens). The answer is D.

p1s3c
May 15, 2023

the thing that bothers me with D is that the incident response plan would have an action to look for this data in dark web monitoring. For how long? it's like getting robbed and going out into town waiting for the robber to sell your stuff.

BiteSizeOption: D
Jul 19, 2023

1111-1111-1111-1111 is the laziest credit card regex pull. at least get the starting numbers correct 3=AMEX, 4 = Visa, 5 = MC and 6 = DISCOVER. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)

FOURDUEOption: C
Feb 9, 2023

IT IS NOT D. that is a personal area network.. does not make sense to exfiltrate that. this is talking about accounts where all of those listed expressions are part of the customer id.. Introduction to SQL REGEXP A regular expression in standard query language (SQL) is a special rule that is used to define or describe a search pattern or characters that a particular expression can hold. For example, a phone number can only have 10 digits, so in order to check if a string of numbers is a phone number or not, we can create a regular expression for it. It is an in-built specification supported in almost all SQL databases. Regular expressions are very helpful as they let us place multiple lines of code or information in just 1 line. It is particularly helpful in SQL databases when we want to perform validation tasks like if the information provided is a valid PIN code, Contact No, email address, etc. Regular expressions also help in pattern matching or searching the database. https://www.educba.com/sql-regexp/

FOURDUE
Feb 9, 2023

also, i think that if it were PHI there would be other security measures in place to mask the data.

FoxTrotDG
Mar 1, 2023

PAN also stands for Primary Account Number. It's a unique number found on payment cards like debit and credit cards that identifies the card issuer and the cardholder account that is linked to that specific card.

ToneBarOption: D
Feb 11, 2023

If you have to store PAN (Personal Account Numbers) data, then PCI DSS Requirement 3.4 requires that yo render it unreadable and unrecoverable through one of the following methods: One-way hashes based on strong cryptography (has must be of the entire PAN) Truncation (hashing cannot be used to replace the truncated segment of PAN) Index tokens and pads (pads must be securely stored) Strong cryptography with associated key-management processes and procedures

BadgerTesterOption: C
Dec 2, 2023

the question says, "which of the following types of data was compromised, and what steps should the incident response plan contain?" the customer ID was what data was compromised. D does not answer the first half (before the ,) of the question.

EAlonsoOption: D
Jul 13, 2024

D. agreed, this is a legal concern.