Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CAS-005 Topic 1 Question 3 Discussion

Actual exam question for CompTIA's CAS-005 exam
Question #: 3
Topic #: 1
[All CAS-005 Questions]

A company detects suspicious activity associated with external connections Security detection tools are unable to categorize this activity. Which of the following is the best solution to help the company overcome this challenge?

Show Suggested Answer Hide Answer
Suggested Answer: D

User and Entity Behavior Analytics (UEBA) is the best solution to help the company overcome challenges associated with suspicious activity that cannot be categorized by traditional detection tools. UEBA uses advanced analytics to establish baselines of normal behavior for users and entities within the network. It then identifies deviations from these baselines, which may indicate malicious activity. This approach is particularly effective for detecting unknown threats and sophisticated attacks that do not match known indicators of compromise (IoCs).


Contribute your Thoughts:

Alyce
1 months ago
Option D, no doubt. It's like having a security guard that never sleeps and can spot the slightest suspicious activity. Plus, it's probably more effective than staring at the dark web all day.
upvoted 0 times
...
Svetlana
1 months ago
UEBA all the way! Monitoring user behavior is the key to staying one step ahead of those pesky hackers. Now, where's my tin foil hat?
upvoted 0 times
Reyes
19 days ago
I agree, UEBA is a powerful tool in detecting and preventing security threats. It's important to stay proactive in protecting our network.
upvoted 0 times
...
Laine
24 days ago
UEBA is definitely the way to go. Monitoring user behavior can help us catch any suspicious activity before it becomes a problem.
upvoted 0 times
...
...
Lemuel
2 months ago
I think mapping network traffic to known IoCs could also be a good solution to overcome this challenge.
upvoted 0 times
...
Rasheeda
2 months ago
I disagree, I believe monitoring the dark web would be more effective in this situation.
upvoted 0 times
...
Delfina
2 months ago
Mapping network traffic to known IoCs is a good start, but it might not catch everything. Gotta keep an eye on that dark web too.
upvoted 0 times
Kanisha
13 days ago
D: Implement UEBA
upvoted 0 times
...
Simona
28 days ago
C: Monitor the dark web
upvoted 0 times
...
Jaime
1 months ago
B: Map network traffic to known IoCs.
upvoted 0 times
...
Kerrie
1 months ago
A: Implement an Interactive honeypot
upvoted 0 times
...
...
Cecilia
2 months ago
I think the best solution is to implement an Interactive honeypot.
upvoted 0 times
...
Dorothy
2 months ago
Ooh, a honeypot could be fun! Lure those hackers in and see what they're up to. But I guess UEBA is the more practical choice.
upvoted 0 times
Julie
20 days ago
C: Monitoring the dark web could also give us valuable insights into the suspicious activity.
upvoted 0 times
...
Marnie
21 days ago
B: I agree, but UEBA might be a more practical solution in the long run.
upvoted 0 times
...
Gracia
1 months ago
A: Let's set up a honeypot and catch those hackers in the act!
upvoted 0 times
...
...
Dong
2 months ago
Option D seems like the way to go. UEBA can help identify unusual user behavior and detect potential threats.
upvoted 0 times
Suzan
1 months ago
It's important for companies to stay proactive in monitoring user behavior to prevent potential security incidents.
upvoted 0 times
...
Launa
1 months ago
Implementing UEBA can definitely enhance the company's security posture and improve threat detection capabilities.
upvoted 0 times
...
Youlanda
2 months ago
I agree, UEBA can provide valuable insights into user activities and help prevent security breaches.
upvoted 0 times
...
Cyndy
2 months ago
Option D seems like the way to go. UEBA can help identify unusual user behavior and detect potential threats.
upvoted 0 times
...
...

Save Cancel