Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 199

A security analyst discovered that a database administrator's workstation was compromised by malware. After examining the logs, the compromised workstation was observed connecting to multiple databases through ODBC. The following query behavior was captured:

Assuming this query was used to acquire and exfiltrate data, which of the following types of data was compromised, and what steps should the incident response plan contain?

    Correct Answer: D

    The query is designed to match strings that conform to a specific pattern, which appears as four sets of four digits separated by hyphens. This format is characteristic of a Primary Account Number (PAN), commonly found on credit cards and similar payment cards. When PAN data is compromised, it is crucial to inform the legal department as it likely involves regulatory and compliance issues. Additionally, monitoring for this data on dark web marketplaces is critical to detect and respond to potential misuse. Therefore, the correct answer is that PAN data was compromised, and the incident response plan should include informing the legal department and monitoring the dark web for this data.

Discussion
BiteSizeOption: D

1111-1111-1111-1111 is the laziest credit card regex pull. at least get the starting numbers correct 3=AMEX, 4 = Visa, 5 = MC and 6 = DISCOVER. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)

FoxTrotDGOption: D

PAN is referring to a primary account number, which is associated with payment cards, like debit and credit cards. Also, the regular expression matches a string of digits that is formatted like a credit card number (four sets of four digits separated by hyphens). The answer is D.

p1s3c

the thing that bothers me with D is that the incident response plan would have an action to look for this data in dark web monitoring. For how long? it's like getting robbed and going out into town waiting for the robber to sell your stuff.

EAlonsoOption: D

D. agreed, this is a legal concern.

BadgerTesterOption: C

the question says, "which of the following types of data was compromised, and what steps should the incident response plan contain?" the customer ID was what data was compromised. D does not answer the first half (before the ,) of the question.

ToneBarOption: D

If you have to store PAN (Personal Account Numbers) data, then PCI DSS Requirement 3.4 requires that yo render it unreadable and unrecoverable through one of the following methods: One-way hashes based on strong cryptography (has must be of the entire PAN) Truncation (hashing cannot be used to replace the truncated segment of PAN) Index tokens and pads (pads must be securely stored) Strong cryptography with associated key-management processes and procedures

FOURDUEOption: C

IT IS NOT D. that is a personal area network.. does not make sense to exfiltrate that. this is talking about accounts where all of those listed expressions are part of the customer id.. Introduction to SQL REGEXP A regular expression in standard query language (SQL) is a special rule that is used to define or describe a search pattern or characters that a particular expression can hold. For example, a phone number can only have 10 digits, so in order to check if a string of numbers is a phone number or not, we can create a regular expression for it. It is an in-built specification supported in almost all SQL databases. Regular expressions are very helpful as they let us place multiple lines of code or information in just 1 line. It is particularly helpful in SQL databases when we want to perform validation tasks like if the information provided is a valid PIN code, Contact No, email address, etc. Regular expressions also help in pattern matching or searching the database. https://www.educba.com/sql-regexp/

FOURDUE

also, i think that if it were PHI there would be other security measures in place to mask the data.

FoxTrotDG

PAN also stands for Primary Account Number. It's a unique number found on payment cards like debit and credit cards that identifies the card issuer and the cardholder account that is linked to that specific card.