An analyst has several malware samples from the same campaign and wants to detect related files based on unique strings and byte patterns. Which method is MOST appropriate? In the alert triage phase, Which action gives the analyst the clearest next triage step?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Distractor review
Tune DHCP lease duration
DHCP settings are unrelated to malware file identification.
Distractor review
Use only a firewall deny rule for port 443
The malware may use common ports; file-based detection requires a different control.
Best answer
Create and test a YARA rule against known-good and known-bad samples
YARA rules are suitable for identifying malware families using file strings, byte sequences, and conditions.
Distractor review
Create a CVE entry
CVE identifiers track vulnerabilities, not file-pattern detections.
Common exam trap
Common exam trap: NAT rules depend on direction and matching traffic
NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.
Technical deep dive
How to think about this question
NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.
KKey Concepts to Remember
- Static NAT maps one inside address to one outside address.
- PAT allows many inside hosts to share one public address using ports.
- Inside local and inside global describe the private and translated addresses.
- NAT ACLs identify traffic for translation, not always security filtering.
TExam Day Tips
- Identify inside and outside interfaces first.
- Check whether the scenario needs static NAT, dynamic NAT or PAT.
- Do not confuse NAT matching ACLs with normal packet-filtering intent.
Related practice questions
Related CS0-003 practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
CompTIA A+ hardware practice questions
Practise CS0-003 questions linked to CompTIA A+ hardware.
CompTIA A+ mobile devices practice questions
Practise CS0-003 questions linked to CompTIA A+ mobile devices.
CompTIA A+ networking practice questions
Practise CS0-003 questions linked to CompTIA A+ networking.
CompTIA A+ operating systems practice questions
Practise CS0-003 questions linked to CompTIA A+ operating systems.
CompTIA A+ security practice questions
Practise CS0-003 questions linked to CompTIA A+ security.
CompTIA A+ software troubleshooting questions
Practise CS0-003 questions linked to CompTIA A+ software troubleshooting questions.
CompTIA A+ operational procedures questions
Practise CS0-003 questions linked to CompTIA A+ operational procedures questions.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A responder is acquiring evidence from a potentially compromised server. Which actions support forensic integrity? (Choose two.)
Question 2
A SOC wants to reduce alert fatigue without missing confirmed malicious activity. Which actions are appropriate? (Choose two.)
Question 3
A user reports approving an unexpected OAuth consent prompt for an app named 'Invoice Reader'. The app now has mailbox read permissions. What should the incident responder do first? During detection and analysis, which decision is most defensible?
Question 4
A business owner accepts delayed remediation for a production system. What must the report include? If the primary audience is business service owner, which content choice is most appropriate?
Question 5
A business owner accepts delayed remediation for a production system. What must the report include? If the primary audience is legal/privacy stakeholder, which content choice is most appropriate?
Question 6
A host alert shows certutil.exe downloading a file from an external URL, followed by execution from a user-writable directory. What should the analyst focus on? In the containment trade-off phase, Which response balances containment with evidence preservation?
FAQ
Questions learners often ask
What does this CS0-003 question test?
Static NAT maps one inside address to one outside address.
What is the correct answer to this question?
The correct answer is: Create and test a YARA rule against known-good and known-bad samples — YARA rules are suitable for identifying malware families using file strings, byte sequences, and conditions. This keeps the analysis focused on alert triage rather than broad, low-value actions.
What should I do if I get this CS0-003 question wrong?
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Discussion
Sign in to join the discussion.