nerdexam
CompTIACompTIA

CS0-003 · Question #246

CS0-003 Question #246: Real Exam Question with Answer & Explanation

The correct answer is A: An Office document with a malicious macro was opened.. An Office document with a malicious macro was opened is the most likely explanation for the suspicious activity on the company laptop, as it reflects the common technique of using macros to execute PowerShell commands that download and run malware. A macro is a piece of code that

Submitted by klara.se· Mar 6, 2026Security operations

Question

A security analyst receives an alert for suspicious activity on a company laptop. An excerpt of the log is shown below: Which of the following has most likely occurred?

Options

  • AAn Office document with a malicious macro was opened.
  • BA credential-stealing website was visited.
  • CA phishing link in an email was clicked
  • DA web browser vulnerability was exploited.

Explanation

An Office document with a malicious macro was opened is the most likely explanation for the suspicious activity on the company laptop, as it reflects the common technique of using macros to execute PowerShell commands that download and run malware. A macro is a piece of code that can automate tasks or perform actions in an Office document, such as a Word file or an Excel spreadsheet. Macros can be useful and legitimate, but they can also be abused by threat actors to deliver malware or perform malicious actions on the system. A malicious macro can be embedded in an Office document that is sent as an attachment in a phishing email or hosted on a compromised website. When the user opens the document, they may be prompted to enable macros or content, which will trigger the execution of the malicious code. The malicious macro can then use PowerShell, which is a scripting language and command-line shell that is built into Windows, to perform various tasks, such as downloading and running malware from a remote URL, bypassing security controls, or establishing persistence on the system. The log excerpt shows that PowerShell was used to download a string from a URL using the WebClient.DownloadString method, which is a common way to fetch and execute malicious code from the internet. The log also shows that PowerShell was used to invoke an expression (iex) that contains obfuscated code, which is another common way to evade detection and analysis.

Topics

#Log analysis#Malware analysis#Suspicious activity#Incident detection

Community Discussion

No community discussion yet for this question.

Full CS0-003 PracticeBrowse All CS0-003 Questions