CS0-003 Exam QuestionsBrowse all questions from this exam

CS0-003 Exam - Question 130


Following a recent security incident, the Chief Information Security Officer is concerned with improving visibility and reporting of malicious actors in the environment. The goal is to reduce the time to prevent lateral movement and potential data exfiltration. Which of the following techniques will best achieve the improvement?

Show Answer
Correct Answer: AB

The primary goal is to reduce the time to prevent lateral movement and potential data exfiltration after a security incident has been detected. This requires a quick response to mitigate the threat, which is best accomplished by improving the Mean Time to Respond. Increased visibility and reporting help to detect incidents faster, but the critical factor in stopping further damage is how quickly the organization can react once an incident is detected. Therefore, improving the Mean Time to Respond will directly address the need to swiftly contain and mitigate the malicious activity.

Discussion

17 comments
Sign in to comment
ms123451Option: B
Sep 5, 2023

The detection already occured and you are preventing lateral movement therefore you are concerned about Mean Time To RESPOND to prevent further damage after detection

LB54
Jul 17, 2024

The whole response already occured in this scenario. "Chief Information Security Officer is concerned with improving visibility and reporting of malicious actors in the environment." He CISO is concerned with "Mean Time to Detect". If you can detect and report malicious actors in the environment sooner, you can respond sooner and achieve the goal which is "reduce the time to prevent lateral movement and potential data exfiltration"

kmordalvOption: A
Sep 1, 2023

Correct Improving the Mean Time to Detect (MTTD) is the most relevant technique to achieve the goal of reducing the time to prevent lateral movement and potential data exfiltration by malicious actors. MTTD measures the average time it takes for an organization to detect a security incident or malicious activity once it has occurred. By reducing MTTD, you can identify security threats more quickly, which allows for a faster response to contain the threat, prevent lateral movement, and potentially stop data exfiltration before it occurs.

NarobiOption: A
Dec 9, 2023

Both A and B would reduce the time to prevent lateral movement and potential data exfiltration. If A was improved, the team would be able to act sooner If B was improved, the team would respond faster The CISO wants to improve "visibility and reporting of malicious actors". Only A addresses this. As with B, the reporting has already occurred. Given this, my answer is A.

throughthefray
Dec 15, 2023

The question gives you two goals... Goal 1: Improve visibility and reporting. Option A directly addresses this concern Goal 2: Reduce time it takes to prevent lateral movement and data exfilration. Option B directly addresses this concern Based on how the question is worded this really should be a "pick two" question.

MrNYCOption: A
Feb 2, 2024

Which of the following techniques will best achieve the improvement? So to best achieve the improvement , I would go for A . If the question asked to reduce the time to prevent , I would go for B. Here I am leaning towards A.

FT000Option: A
Feb 25, 2024

My vote is for A. We have to address the concern, which is the reporting of vulnerabilities (MTTD). The goal, which is reducing the time to allow for traversal, etc. (MTTR) depends heavily on how quickly the vulnerability is detected and reported to the CSIO/CSIRT.

BanesTechOption: B
May 1, 2024

The question specifically mentions improving the visibility and reporting of malicious actors to reduce the time to prevent lateral movement and potential data exfiltration. Option B, "Mean time to respond," directly addresses the need to react swiftly once a security incident is detected.

GeronemoOption: B
May 17, 2024

Mean time to respond (MTTR) refers to the average time it takes an organization to respond to a security incident once it has been detected. By focusing on reducing the mean time to respond, the organization can improve its ability to react promptly to security incidents, thereby minimizing the window of opportunity for malicious actors to carry out lateral movement or data exfiltration. This involves establishing efficient incident response processes, including detection, analysis, containment, eradication, and recovery. Improving MTTR enhances the organization's overall security posture and helps in mitigating the impact of security incidents.

bettybooOption: A
Mar 16, 2024

I go with A. Mean time to detect

ChanceFreedomOption: A
Apr 17, 2024

When stuck between A and B I would compare the outcome with having one working well and one working poorly. If you know you'll detect it, it can eventually br resolved. If you never detect it or 6 months later?...

dido80Option: B
Dec 1, 2023

Mean time to respond (MTTR) measures the average time taken to respond to and mitigate a security incident once it has been detected. Reducing MTTR is crucial in minimizing the window of opportunity for attackers to move laterally within the network or exfiltrate data. A quicker response, involving containment and mitigation actions, helps prevent or limit the extent of lateral movement and data exfiltration by malicious actors after detection of a security incident.

deedenOption: A
Dec 4, 2023

I was going to say C and then changed to B, but then I thought you can't fix what you don't know is broken, especially zero-days.

Dub3Option: B
May 19, 2024

Security event already happened. Definitely MTTR

Ree1234Option: B
May 19, 2024

The question specifically mentions improving the visibility and reporting of malicious actors to reduce the time to prevent lateral movement and potential data exfiltration. Option B, "Mean time to respond," directly addresses the need to react swiftly once a security incident is detected.

myazureexamsOption: B
May 20, 2024

Per CertMaster: Mean Time to Respond is "a metric that measure the average time it takes to respond to an incident. It measures the speed and efficiency of response activities related to a detected event." Mean Time to Detect "measures the average time between the initial appearance of a security incident and its detection." In this question, the CISO wants to prevent 'lateral movement and prevent data exfiltration" AFTER an event has been detected. So my answer is B Mean Time To Respond - that is, in order to prevent data exfiltration and lateral movement. To me that is a response that needs to be taken AFTER detection.

c83335bOption: B
May 22, 2024

guys it can't be A. The goal is to reduce the time to prevent lateral movement and potential data exfiltration so it most be B. Because Detecting doesn't stop anything from happening.

boogOption: B
Jun 20, 2024

'Prevent' is a type of response