CS0-003 Exam QuestionsBrowse all questions from this exam

CS0-003 Exam - Question 140


An organization enabled a SIEM rule to send an alert to a security analyst distribution list when ten failed logins occur within one minute. However, the control was unable to detect an attack with nine failed logins. Which of the following best represents what occurred?

Show Answer
Correct Answer: C

The control was designed to trigger on ten failed logins within one minute. Since there were only nine failed logins, the alert was not triggered. However, an attack did occur and was not detected because the number of failed logins did not meet the threshold set by the alert rule. This situation is a False Negative because a legitimate attack was not flagged by the security system.

Discussion

17 comments
Sign in to comment
[Removed]Option: B
Nov 27, 2023

The answer is B) True negative The criteria for triggering the alert was 10 failed logins. Only 9 occurred, so no alert should be generated since the criteria wasn't met. If it's reporting prematurely, then the SIEM rule is failing and generating a false positive. If no attack was detected with 9 failed logins, then the rule is working, in other words, a True Negative, meaning there really wasn't an alert that needed to be reported.

ChanceFreedom
Apr 17, 2024

"However, the control was unable to detect an attack with nine failed logins." It said behavior "attack" was a negative. False negative. I hate semantics

RiccardoBellitto
Apr 24, 2024

The questions is stating that the control was unable to DETECT AN ATTACK with nine failed logon. Breaking down this sentece: There has been an attack and it wasn't detected. So the answer is False negative

LB54
Jul 17, 2024

The SIEM rule indeed worked as expected by not triggering an alert at 9 failed login attempts. However, the issue lies in the threshold being set too high. Since the threshold was 10 failed logins within one minute, it failed to detect an actual attack when there were 9 failed logins. This situation is indeed a False Negative because the rule missed a legitimate security event.

499f1a0Option: B
Jun 8, 2024

true negative makes sense because the control was unable to detect an attack which means it exists but not reported. It can't be false negative because attack exists and it means it does not exist/not reported.

ariel004
Jun 14, 2024

agree 100% !

Saad76Option: C
Jun 17, 2024

There has BEEN AN ATTACK. and it failed to alert because it the threshold was too high, therefore it is a False Negative.

CyberJackalOption: C
Mar 29, 2024

It's a stupid question, but the SIEM falsely reported that an attack did not occur when it in fact did- a false negative.

Eduardoo7Option: B
Apr 11, 2024

doesn't matter if it was supposed to detect 10 fails or 10000 fails. until the condition isn't met the rule in this case is a true negative.

section8santaOption: C
Apr 19, 2024

trust me

captaintoadyoOption: B
May 3, 2024

I don't understand why people choose answer C this is very incorrect the firewall rule not triggering was correct, it has been set to TRIGGER ONLY AFTER 10 failed login attempts the criteria was not met, and the trigger did not happen. The answer True negative is correct.

KingCyberOption: B
May 17, 2024

100 percent True Negative

KmelaunOption: C
Apr 16, 2024

This exam is really made to trick you, but the answer is C. The SIEM failed to alert the organization about an attack which is the definition of a false negative. If there wasn't an attack this would be considered a true negative.

RiccardoBellittoOption: C
Apr 24, 2024

There has been an attack and it wasn't detected. So the answer is False negative

BanesTechOption: C
May 1, 2024

A false negative occurs when a security control or detection mechanism fails to identify a genuine security threat or attack that actually occurred. In this case, the SIEM rule did not trigger an alert for nine failed logins within one minute, even though this activity could potentially indicate a brute-force or password-guessing attack. As a result, the organization missed detecting suspicious activity, leading to a false sense of security and leaving the system vulnerable to compromise.

Rumchata556
May 2, 2024

wrong, their threshold is 10 failed logins so the alert should not have been triggered making this a true negative.

Rumchata556Option: B
May 2, 2024

Threshold for failed logins is 10, the amount of times that actually failed is 9 so this is in fact an accurate reading. making it a true negative

ckditroOption: C
May 17, 2024

The question implies there is an issue here that wasn't detected. Think of it as a pregnancy test. What do you want to get? Is it a false negative and a baby on your lap, or a true negative and a cold beer?

SHADTECH123Option: B
Jun 21, 2024

Therefore, the SIEM rule's behavior in not alerting for nine failed logins is an example of a True negative. It correctly recognized that the conditions specified (ten failed logins within one minute) were not fulfilled, hence no alert was generated.So, the best representation of what occurred in this scenario is B. True negative.

zecomeia_007Option: B
Jul 11, 2024

The answer is B) True negative

LB54Option: C
Jul 17, 2024

The SIEM rule worked as expected by not triggering an alert at 9 failed login attempts. However, the issue lies in the threshold being set too high. Since the threshold was 10 failed logins within one minute, it failed to detect an actual attack when there were 9 failed logins. This situation is a False Negative because the rule missed a legitimate security event.

a3432e2Option: C
Jul 22, 2024

The failure to detect nine failed logins when the rule is set to trigger at ten means the rule did not identify an attack that was occurring. This is characteristic of a failure in the detection mechanism for legitimate threats. "The failure to detect nine failed logins when the rule is set to trigger at ten means the rule did not identify an attack that was occurring. This is characteristic of a failure in the detection mechanism for legitimate threats." - Source: The Official Comptia CySA+ Study Guide, Topic 6B Explore Vulnerability Validation Concepts

a3432e2
Jul 22, 2024

" When a vulnerability scan incorrectly identifies that a vulnerability does not exist. For example, when a vulnerability scan identifies that a web server is using compliant cipher suites when it is not, if the scanner is misconfigured or uses an outdated signature engine during evaluation. False negatives are the most concerning issue as they represent a failure of the scanning tool to report on a legitimate issue. Using multiple scanning tools can mitigate the risk of false negatives because the scan outputs of each tool can be correlated to identify vulnerabilities more confidently." - Heres the Comptia Reference