Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions
Questions # 1:

A SIEM alert is triggered based on execution of a suspicious one-liner on two workstations in the organization's environment. An analyst views the details of these events below:

Question # 1

Which of the following statements best describes the intent of the attacker, based on this one-liner?

Options:

A.

Attacker is escalating privileges via JavaScript.


B.

Attacker is utilizing custom malware to download an additional script.


C.

Attacker is executing PowerShell script "AccessToken.psr.


D.

Attacker is attempting to install persistence mechanisms on the target machine.


Expert Solution
Questions # 2:

An organization discovered a data breach that resulted in Pll being released to the public. During the lessons learned review, the panel identified discrepancies regarding who was responsible for external reporting, as well as the timing requirements. Which of the following actions would best address the reporting issue?

Options:

A.

Creating a playbook denoting specific SLAs and containment actions per incident type


B.

Researching federal laws, regulatory compliance requirements, and organizational policies to document specific reporting SLAs


C.

Defining which security incidents require external notifications and incident reporting in addition to internal stakeholders


D.

Designating specific roles and responsibilities within the security team and stakeholders to streamline tasks


Expert Solution
Questions # 3:

An employee accessed a website that caused a device to become infected with invasive malware. The incident response analyst has:

• created the initial evidence log.

• disabled the wireless adapter on the device.

• interviewed the employee, who was unable to identify the website that was accessed

• reviewed the web proxy traffic logs.

Which of the following should the analyst do to remediate the infected device?

Options:

A.

Update the system firmware and reimage the hardware.


B.

Install an additional malware scanner that will send email alerts to the analyst.


C.

Configure the system to use a proxy server for Internet access.


D.

Delete the user profile and restore data from backup.


Expert Solution
Questions # 4:

A cybersecurity analyst is recommending a solution to ensure emails that contain links or attachments are tested before they reach a mail server. Which of the following will the analyst most likely recommend?

Options:

A.

Sandboxing


B.

MFA


C.

DKIM


D.

Vulnerability scan


Expert Solution
Questions # 5:

A cybersecurity team lead is developing metrics to present in the weekly executive briefs. Executives are interested in knowing how long it takes to stop the spread of malware that enters the network.

Which of the following metrics should the team lead include in the briefs?

Options:

A.

Mean time between failures


B.

Mean time to detect


C.

Mean time to remediate


D.

Mean time to contain


Expert Solution
Questions # 6:

Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure it will not be detected by the victim organization's endpoint security protections. Which of the following stages of the Cyber Kill Chain best aligns with the threat actor's actions?

Options:

A.

Delivery


B.

Reconnaissance


C.

Exploitation


D.

Weaponizatign


Expert Solution
Questions # 7:

A security analyst has received an incident case regarding malware spreading out of control on a customer's network. The analyst is unsure how to respond. The configured EDR has automatically obtained a sample of the malware and its signature. Which of the following should the analyst perform next to determine the type of malware, based on its telemetry?

Options:

A.

Cross-reference the signature with open-source threat intelligence.


B.

Configure the EDR to perform a full scan.


C.

Transfer the malware to a sandbox environment.


D.

Log in to the affected systems and run necstat.


Expert Solution
Questions # 8:

During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related to its volatility level?

Options:

A.

Disk contents


B.

Backup data


C.

Temporary files


D.

Running processes


Expert Solution
Questions # 9:

Which of the following would an organization use to develop a business continuity plan?

Options:

A.

A diagram of all systems and interdependent applications


B.

A repository for all the software used by the organization


C.

A prioritized list of critical systems defined by executive leadership


D.

A configuration management database in print at an off-site location


Expert Solution
Questions # 10:

After a security assessment was done by a third-party consulting firm, the cybersecurity program recommended integrating DLP and CASB to reduce analyst alert fatigue. Which of the following is the best possible outcome that this effort hopes to achieve?

Options:

A.

SIEM ingestion logs are reduced by 20%.


B.

Phishing alerts drop by 20%.


C.

False positive rates drop to 20%.


D.

The MTTR decreases by 20%.


Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-10 out of questions