{"id":53,"date":"2022-11-25T17:22:47","date_gmt":"2022-11-25T17:22:47","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/comptia-cysacs0-002-question047\/"},"modified":"2022-11-25T17:22:47","modified_gmt":"2022-11-25T17:22:47","slug":"comptia-cysacs0-002-question047","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/comptia-cysacs0-002-question047\/","title":{"rendered":"CompTIA CySA+CS0-002 &#8211; Question047"},"content":{"rendered":"<div class=\"question\">During the forensic analysis of a compromised machine, a security analyst discovers some binaries that are exhibiting abnormal behaviors. After extracting the strings, the analyst finds unexpected content. Which of the following is the NEXT step the analyst should take?<br \/><strong><br \/>A.<\/strong> Validate the binaries&#039; hashes from a trusted source.<br \/><strong>B.<\/strong> Use file integrity monitoring to validate the digital signature.<br \/><strong>C.<\/strong> Run an antivirus against the binaries to check for malware.<br \/><strong>D.<\/strong> Only allow whitelisted binaries to execute.<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>During the forensic analysis of a compromised machine, a security analyst discovers some binaries that are exhibiting abnormal behaviors. After extracting the strings, the analyst finds unexpected content. Which of the following is the NEXT step the analyst should take?A. Validate the binaries&#039; hashes from a trusted source.B. Use file integrity monitoring to validate the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,50],"class_list":["post-53","post","type-post","status-publish","format-standard","hentry","category-comptia-cysacs0-002","tag-comptia-cysacs0-002","tag-question-047"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/posts\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/comments?post=53"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/posts\/53\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/media?parent=53"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/categories?post=53"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/tags?post=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}