Exam CS0-003 All QuestionsBrowse all questions from this exam
Question 21

Which of the following security operations tasks are ideal for automation?

    Correct Answer: D

    Email header analysis is an ideal task for automation because it involves checking structured data (email headers) for predefined metrics (phishing confidence). This process is highly deterministic and can be handled effectively by automated systems without the need for nuanced decision-making. The sequence of actions—checking the header, adding the sender's domain to a block list, and quarantining the email—can be predefined, executed consistently by automated systems, and has minimal need for human oversight.

Discussion
TonyingOption: A

D is not the best answer, what if the domain of the sender is benign like gmail or yahoo or any free email services then you block those legitimate domains, that will compromise the availability of the firm. Most phishers are using free email services.

Christof

True, domains are not normally blocked. Maybe the answer was supposed to be written better to say the sender address though.

GoldenghostOption: D

I'd lean slightly towards D. Email header analysis as the most ideal in this specific comparison for a few reasons: Maturity: Email filtering has more established rules and better anti-evasion in most tools. Specificity: Phishing confidence metrics give a finer level of granularity compared to firewall IoC blocking, potentially reducing false positives. Important Caveats: Real-world complexity: Both tasks still need some human oversight and tuning. Your environment: The specific firewall and email security tools you use might affect which task is easier to automate effectively.

GeronemoOption: D

This is one of those questions where A,B, or D are all ideal or suitable for automation. b) This task is also suitable for automation. Automated systems can continuously monitor firewall logs for indicators of compromise (IoCs) and promptly take mitigating actions to block malicious behavior, thereby reducing the window of exposure. d) Automating this task is ideal. Automated systems can analyze email headers for phishing indicators and apply predefined actions (such as blocking the sender's domain and moving the email to quarantine) based on confidence metrics, thereby reducing the risk of successful phishing attacks.

Dub3

Agreed!

RobVOption: B

If you have to choose only one task for automation, and considering the potential for efficiency and rapid response, "Firewall IoC block actions" (Option B) may be better suited for automation. This task involves examining firewall logs for Indicators of Compromise (IoCs) and taking mitigating actions to block specific behaviors found in the logs.

499f1a0Option: D

D is the ideal option because B has followup part which can not be automated and must be done by humans.

Mehe323Option: D

I don't think it should be B because of the zero day exploit part, much more information needs to be uncovered before calling it 'ideal' for automation.

dave_delete_meOption: D

D. Email header analysis (for the WIN)!!!!! Seems to be the BEST response to this poorly written question! :-p

89b45b4Option: D

The question refers to automation, B is bit more complicated than D. So therefore, D shows that it is a straightforward process and easy to follow. Less mistakes for the automation process to follow through.

B3hindCl0sedD00rsOption: D

Gonna have to go with D here as that process can be fully automated.

FATWENTYSIXOption: D

The giveaway in the question is "Ideal." Most organizations opt to use automated email analysis as a first line of defense against malicious and spam emails. Automated tools look for indicators like known malicious or spam senders, often using block lists built using information from around the world. They also scan every email looking for malicious payloads like malware or other unwanted files. The same tools often perform header analysis and message content analysis...(CompTIA CySA+ Study Guide CS0-003, 3rd Edition, CH 3, pg 115, Analyzing Email.)

RobV

Even chat GPT says both B& D. LOL The "best" approach depends on various factors, including the specific needs of the organization, the nature of the security operations, and the available resources. However, both tasks (B and D) are good candidates for automation.

OlaeOption: D

The answer is D: Email Header Analysis. Every process there can be completely automated. Those saying B, how do you automate the follow up of false positives?

dave_delete_meOption: B

It can't be. Firewall, because you should be denying all traffic other than what you explicitly permit.

BanesTechOption: B

Automating the examination of firewall logs for Indicators of Compromise (IoCs) and taking mitigating actions to block suspicious behavior can significantly enhance the efficiency and effectiveness of security operations. While other tasks listed in options A, C, and D may benefit from some level of automation, such as log analysis or user support workflows, they may involve more nuanced decision-making or human intervention compared to the straightforward IoC blocking actions in option B.

FATWENTYSIXOption: D

Selected Answer: D The giveaway in the question is "Ideal." Most organizations opt to use automated email analysis as a first line of defense against malicious and spam emails. Automated tools look for indicators like known malicious or spam senders, often using block lists built using information from around the world. They also scan every email looking for malicious payloads like malware or other unwanted files. The same tools often perform header analysis and message content analysis...(CompTIA CySA+ Study Guide CS0-003, 3rd Edition, CH 3, pg 115, Analyzing Email.)

Cpt_EmeraldOption: D

True automation from start to finish would be D IMO. Look at the last step in Answer B. "Follow up on any false positives that were caused by the block rules" If it was truly automated, no follow up on FP's would be necessary. automatic block rules creating FP's defeats the purpose of automation.

POGActual

Thats the human interaction part of the alert, to follow up on it. D has ALL steps that can be automated, not just one or tow.

indyrckstarOption: D

Went with D as it is easier to automate than B.