Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 338

A security analyst is monitoring an organization's IDS and DLP systems for an alert indicating files were removed from the network. The files were from the workstation of an employee who was authenticated but not authorized to access the files. Which of the following should the organization do FIRST to address this issue?

    Correct Answer: B

    Disabling the employee's credentials is the first step the organization should take to address this issue. This action immediately cuts off the unauthorized access while maintaining the integrity of the investigation process. Isolating the employee's network segment could be more complex and slower to implement compared to disabling credentials, which can be done more rapidly and effectively to prevent any immediate risk.

Discussion
32d799aOption: D

D. Isolating the employee's network segment will prevent any further unauthorized access, file transfers, or potential damage while preserving evidence for an investigation. This immediate action ensures that while the investigation is ongoing, the potential threat is contained.

CXSSPOption: D

D. Isolate the employee's network segment and investigate further. In this scenario, where an authenticated but unauthorized employee accessed files from their workstation, it is crucial to take immediate action to prevent any further unauthorized access or potential data exfiltration. The first step should be to isolate the employee's network segment. This will help contain any potential threat and prevent it from spreading further within the network. After isolation, a thorough investigation should be conducted to understand the extent of the unauthorized access, identify any potential data breaches, and determine if any further actions are necessary. This investigation may involve reviewing logs, examining the affected workstation, and possibly involving the appropriate authorities within the organization.

23169fdOption: D

Containment: Isolating the network segment ensures that the employee cannot continue accessing sensitive files or exfiltrating data. Investigation: This allows the security team to investigate the incident thoroughly to understand what was accessed, how it was accessed, and whether any other systems or data were compromised. Mitigation: This step mitigates the risk of further unauthorized access while preserving the current state of the employee's workstation for forensic analysis.

weaponxcelOption: D

D. Isolate the employee's network segment and investigate further. Isolate the employee's network segment and investigate further. This will help to prevent the employee from causing any further damage and will also help to identify the root cause of the issue.