Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CAS-004 Topic 3 Question 71 Discussion

Actual exam question for CompTIA's CAS-004 exam
Question #: 71
Topic #: 3
[All CAS-004 Questions]

A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.

The technician will define this threat as:

Show Suggested Answer Hide Answer
Suggested Answer: B

File hashing is used to create a digital fingerprint of files to detect unauthorized changes. By comparing the hash values before and after analysis, the integrity of the files can be validated. This aligns with CASP+ objective 5.2, which includes forensic evidence integrity and validation methods.


Contribute your Thoughts:

Kimbery
12 minutes ago
I agree with Latrice, the activity over three months and then suddenly stopping seems like an advanced persistent threat.
upvoted 0 times
...
Latrice
23 hours ago
I think the threat is an advanced persistent threat.
upvoted 0 times
...

Save Cancel