CAS-004 Exam QuestionsBrowse all questions from this exam

CAS-004 Exam - Question 276


An organization thinks that its network has active, malicious activity on it. Which of the following capabilities would BEST help to expose the adversary?

Show Answer
Correct Answer: B

When an organization suspects active malicious activity within its network, the most effective approach to expose the adversary is to proactively search for them. Expanding SOC (Security Operations Center) functions to include threat hunting involves actively and iteratively searching through the network to detect and isolate advanced threats that may have evaded existing security solutions. This method allows for thorough investigation and analysis, increasing the chances of identifying and responding to malicious activity. Unlike honeypots and decoys, which are more passive and reactive, threat hunting is a dynamic and continuous approach better suited for exposing adversaries already operating within the network.

Discussion

17 comments
Sign in to comment
ewbafoowOption: A
May 20, 2023

Best answer feels like Honeypot and Decoys, as their primary purpose is to expose or trap adversaries. I am unsure how B could be the answer.

ThatGuyOverThereOption: B
Oct 31, 2023

Honeypots may cause a threat actor to fall for the bait and expose themselves but it's not as comprehensive as pouring through SOC data from all systems to hunt for an active threat. I'd compare it to trying to find a bandit in the woods. Which would be better? Setting up some traps and hoping the bandit wanders across them and takes the bait, or sending out a large search party and looking over the entire area?

hb0011Option: B
Jan 15, 2024

If you think you have threats you need to go hunting.

ElDirecOption: B
Feb 4, 2024

The capability that would best help to expose the adversary is B. Expanding SOC (Security Operations Center) functions to include hunting. Threat hunting involves proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. In this context, expanding SOC functions to include hunting would mean actively looking for signs of malicious activity within an organization’s network to detect threats that automated systems may have missed. Therefore, the correct answer is B. Expanding SOC functions to include hunting.

userguy890Option: B
Feb 23, 2024

Originally thought A, but A is passive while B is active. Going hunting is an active way to find the threat rather than waiting for the honeypot to get something

Uncle_LuciferOption: B
Aug 30, 2023

This is certainly B. Deception/honey pot is to monitor or observe an attackers techniques, not to detect malicious codes. hunting is a continuous, proactive approach that aims to detect adversaries that have managed to bypass initial security measures. It involves actively seeking out signs of malicious activity and investigating them further to determine if they pose a real threat.

isaphiltrick
Sep 1, 2023

I think you're overthinking this question. It says that the org already suspects that there is active malicious activity in its network. The question asks what is best to "expose" the adversary, not detect malicious codes. So if they set up a honeypot and it gets attacked, then they now know what they're dealing with and can act accordingly--observe, mitigate, etc.

Zulunation
Sep 4, 2023

Installing a honeypot and other decoys, is also a valid approach to detecting malicious activity on a network. A honeypot is a security mechanism that is used to detect, deflect, or counteract attempts at unauthorized use of information systems. It is a decoy system that is intended to be attacked or compromised to divert attackers from valuable targets. Honeypots can be used to collect information about attackers’ methods and tools, and to learn how to better protect real systems. However, while honeypots and other decoys can be effective at detecting certain types of attacks, they may not be as effective at exposing an active adversary that is already present on the network. Expanding SOC functions to include hunting (Option B) is a more proactive approach that can help the organization actively search for signs of malicious activity and take steps to expose the threat.

OdinAtlasSteelOption: B
Nov 7, 2023

Installing a honeypot and other decoys can attract adversaries and help in studying their behavior, but it's more reactive than proactive and may not expose existing malicious activity. On the other hand, expanding SOC functions to include threat hunting (Option B) is a proactive and continuous approach to actively search for signs of malicious activity within the network. This approach aims to uncover adversaries who may have evaded detection and are currently operating within the network. It involves ongoing investigation and analysis to identify hidden threats.

abrubOption: B
Jan 7, 2024

The capability that would BEST help expose the adversary in a network suspected of having active malicious activity is: B. Expanding SOC functions to include hunting Explanation: Installing a honeypot and other decoys (Option A): Honeypots and decoys can attract and detect malicious activity by mimicking real systems or services. However, they are passive in nature and might not expose an adversary actively operating within the network.

talosDevbot
Jan 15, 2024

I concur. Honey pots are passive while threat hunting is active

surfugandaOption: B
Apr 7, 2024

Too much extraneous discussion regarding active/passive whatever. Honeypots are a good idea BEFORE you suspect active, malicious activity. Once you suspect active, malicious activity, a honeypot is not the best move. Question states: [...organization thinks that its network has active, malicious activity...] SOC needs to go hunting. Which of the following capabilities would BEST help to expose the adversary? B. Expanding SOC functions to include hunting

CXSSPOption: B
Sep 10, 2023

B. Expanding SOC functions to include hunting Expanding the Security Operations Center (SOC) functions to include hunting would be the best option for exposing the adversary in this scenario. Here's a brief explanation for each option: A. Installing a honeypot and other decoys: While honeypots and decoys can attract and monitor malicious activity, they may not always directly expose the adversary's true identity or methods. It can provide valuable information, but it might not be the most effective way to directly expose the adversary. B. Expanding SOC functions to include hunting: This involves proactive searching for threats, anomalies, and indicators of compromise within an organization's network. It allows for a more dynamic and continuous approach to identifying and responding to threats. This can be highly effective in exposing active, malicious activity.

CoinUmbrellaOption: A
Sep 13, 2023

Honeypots and Decoys: Honeypots are intentionally deployed systems or networks designed to lure attackers. They appear as valuable targets for attackers but are isolated and closely monitored. By deploying honeypots and decoys, organizations can attract and engage potential adversaries, allowing security teams to closely monitor their activities, gather intelligence, and gain insights into the attacker's tactics, techniques, and procedures (TTPs). This can be an effective way to expose malicious activity and gather valuable threat intelligence.

Meep123Option: A
Oct 2, 2023

When thinking about the word "expose", it leads me to think about "gather evidence", which is something a honeypot would do. However, if the word "Active", or other action words, would have been in this question, I'd choose threat hunt.

Meep123
Oct 2, 2023

"Active", or other similar action words**** (track, hunt, pursue, find, investigate, etc) Clarifying, as expose is also an action word.

GraysenOption: A
Nov 21, 2023

The answer is A

e020fdcOption: A
Feb 16, 2024

Going with honeypot because the threat is active. Set a trap then expand SOC to go hunting.

e4af987Option: A
Apr 2, 2024

Although the AI chatbots say B - i disagree since an SOC is not in the scenario and the keywords "...to EXSPOSE the adversary"

MacherGamingOption: A
Jul 9, 2024

A: Honeypots and Decoys are the best method to expose malicious actors/activity. They are specifically implemented to bait attackers. Threat Hunting is not intended to expose active malicious activity. Threat Hunting or Hunt Teaming is a proactive measure in Incident Detection where the team is proactively looking for vulnerabilities BEFORE they are exploited. Source: Sybex CASP+ Study Guide, Ch. 4 - Proactive Detection, pg. 153-154

23169fdOption: B
Jul 15, 2024

A. Installing a honeypot and other decoys: While honeypots can attract and deceive attackers, they are passive in nature and may not actively expose adversaries already present in the network. SOC hunting involves more active detection and response capabilities.