Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 465

A security analyst has been provided the following partial Snort IDS rule to review and add into the company's Snort IDS to identify a CVE:

alert tcp any any -> SHOME_NET 3389 (flow:to_server,established; content:"MS_T120|00|"; fasc_pattern:only)

Which of the following should the analyst recommend to mitigate this type of vulnerability?

    Correct Answer: B

    The provided Snort IDS rule is designed to detect exploit attempts related to the Remote Desktop Protocol (RDP) by looking for specific traffic patterns on port 3389 associated with known CVEs. The most effective way to mitigate vulnerabilities that can be detected by this rule is to apply operating system patches regularly. This ensures that any security gaps that could be exploited via RDP are closed by the updates provided by the operating system vendor, such as Microsoft for Windows systems, protecting the system from such exploits.

Discussion
isaphiltrickOption: B

The Snort IDS rule provided is designed to detect traffic patterns indicative of attempts to exploit CVEs related to RDP (Remote Desktop Protocol). Specifically, it looks for the presence of the string "MS_T120" in TCP traffic on port 3389, which is commonly used for RDP. To mitigate vulnerabilities associated with RDP, including those detected by this Snort rule, one of the most effective measures is OS patching. Many CVEs affecting RDP are addressed through security updates and patches provided by operating system vendors (e.g., Microsoft for Windows systems). By ensuring that systems are regularly updated with the latest patches, organizations can mitigate the risk of exploitation via RDP vulnerabilities.