セキュリティ アナリストは、顧客のネットワーク上で制御不能に拡散しているマルウェアに関するインシデント ケースを受け取りました。アナリストはどのように対応すればよいかわかりません。設定された EDR は、マルウェアのサンプルとそのシグネチャを自動的に取得しました。テレメトリに基づいてマルウェアの種類を判断するために、アナリストは次に次のどれを実行する必要がありますか。
正解:A
The signature of the malware is a unique identifier that can be used to compare it with known malware samples and their behaviors. Open-source threat intelligence sources provide information on various types of malware, their indicators of compromise, and their mitigation strategies. By cross-referencing the signature with these sources, the analyst can determine the type of malware and its telemetry. The other options are not relevant for this purpose: configuring the EDR to perform a full scan may not provide additional information on the malware type; transferring the malware to a sandbox environment may expose the analyst to further risks; logging in to the affected systems and running netstat may not reveal the malware activity.
References: According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to "use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities". The book also covers the usage and syntax of EDR, a tool used for endpoint security, in chapter 5. Specifically, it explains the meaning and function of malware signatures and how they can be used to identify malware types1, page 203. It also discusses the benefits and challenges of using open-source threat intelligence sources to enhance security analysis1, page 211. Therefore, this is a reliable source to verify the answer to the question.