A security analyst is assisting a software engineer with the - CompTIA CySA+ CSO-003

Question

A security analyst is assisting a software engineer with the development of a custom log collection and alerting tool (SIEM) for a proprietary system. The analyst is concerned that the tool will not detect known attacks and behavioral IoCs. Which of the following should be configured in order to resolve this issue?

Answers
  1. correct
Explanation

The correct answer is C. Integrate with an open-source threat intelligence feed.

To enhance the ability of the custom log collection and alerting tool (SIEM) to detect known attacks and behavioral indicators of compromise (IoCs), integrating with an open-source threat intelligence feed is an effective solution. Threat intelligence feeds provide up-to-date, curated lists of known attack signatures, IP addresses, file hashes, domain names, and other indicators that can be used to detect malicious activity. These feeds allow the SIEM tool to recognize and respond to known threats more effectively.

By integrating with such a feed, the custom SIEM tool can automatically cross-reference incoming logs with threat intelligence data, enabling it to detect known attacks and behaviors that have been observed in the wild.

Why the others are incorrect:

  • Randomly generate and store all possible file hash values: This approach is impractical and inefficient. Generating and storing all possible file hashes is not feasible and would generate an overwhelming amount of data, most of which would not be useful for detecting attacks. The focus should be on collecting relevant and known IoCs.

  • Create a default rule to alert on any change to the system: While this rule could be useful in some scenarios, it is too broad and could lead to a large number of false positives. It would not specifically address the detection of known attacks or behavioral IoCs, which require more targeted detection rules based on actual threat intelligence or attack patterns.

  • Manually add known threat signatures into the tool: Manually adding threat signatures could work, but it is not scalable or efficient. Threat landscapes evolve rapidly, and manually keeping track of and updating known threat signatures is time-consuming and error-prone. Integrating an automated threat intelligence feed is a more effective and sustainable solution.

No Payment Cards Needed

Related Courses

Discover a range of courses designed to provide you with the knowledge and skills needed to excel in your chosen field.

a prepsaret exam featured image
CompTIA Prep

220-1201 - CompTIA A+ Exam Core 1

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

220-1202 - CompTIA A+ Exam Core 2

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA SecurityX CAS-005

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Cloud Essentials+ CLO-002

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Network+ N10-009

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Security+ SY0-701

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Data + DA0-001

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Pentest+

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Linux+ XK0-005

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA DataSys+ DS0-001

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Tech+ FC0-U71

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Cloud+ CV0-004

Start Course Prep
a prepsaret exam featured image
CompTIA Prep

CompTIA Server+ SK0-005

Start Course Prep

Easy way to pass your test within a week with prepsaret

You don’t need one month to study and pass your test.
With Prepsaret, it takes you a few days to grasp all the concepts needed to pass your exams

View Courses Offered