New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 1 out of 13 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following should be updated after a lessons-learned review?

Options:

A.

Disaster recovery plan


B.

Business continuity plan


C.

Tabletop exercise


D.

Incident response plan


Expert Solution
Questions # 2:

An analyst is reviewing a vulnerability report for a server environment with the following entries:

Question # 2

Which of the following systems should be prioritized for patching first?

Options:

A.

10.101.27.98


B.

54.73.225.17


C.

54.74.110.26


D.

54.74.110.228


Expert Solution
Questions # 3:

Which of the following attributes is part of the Diamond Model of Intrusion Analysis?

Options:

A.

Delivery


B.

Weaponization


C.

Command and control


D.

Capability


Expert Solution
Questions # 4:

A systems administrator receives several reports about emails containing phishing links. The hosting domain is always different, but the URL follows a specific pattern of characters. Which of the following is the best way for the administrator to find more messages that were not reported?

Options:

A.

Search email logs for a regular expression


B.

Open a support ticket with the email hosting provider


C.

Send a memo to all staff asking them to report suspicious emails


D.

Query firewall logs for any traffic with a suspicious website


Expert Solution
Questions # 5:

Which of the following threat actors is most likely to target a company due to its questionable environmental policies?

Options:

A.

Hacktivist


B.

Organized crime


C.

Nation-state


D.

Lone wolf


Expert Solution
Questions # 6:

A security analyst reviews a packet capture and identifies the following output as anomalous:

13:49:57.553161 TP10.203.10.17.45701>10.203.10.22.12930:Flags[FPU],seq108331482,win1024,urg0,length0

13:49:57.553162 IP10.203.10.17.45701>10.203.10.22.48968:Flags[FPU],seq108331482,win1024,urg0,length0

...

Which of the following activities explains the output?

Options:

A.

Nmap Xmas scan


B.

Nikto's web scan


C.

Socat's proxying traffic using the urgent flag


D.

Angry IP Scanner output


Expert Solution
Questions # 7:

The architecture team has been given a mandate to reduce the triage time of phishing incidents by 20%. Which of the following solutions will most likely help with this effort?

Options:

A.

Integrate a SOAR platform.


B.

Increase the budget to the security awareness program.


C.

Implement an EDR tool.


D.

Install a button in the mail clients to report phishing.


Expert Solution
Questions # 8:

An organization has a critical financial application hosted online that does not allow event logging to send to the corporate SIEM. Which of the following is the best option for the security analyst to configure to improve the efficiency of security operations?

Options:

A.

Configure a new SIEM specific to the management of the hosted environment.


B.

Subscribe to a threat feed related to the vendor's application.


C.

Use a vendor-provided API to automate pulling the logs in real time.


D.

Download and manually import the logs outside of business hours.


Expert Solution
Questions # 9:

Which of the following are process improvements that can be realized by implementing a SOAR solution? (Select two).

Options:

A.

Minimize security attacks


B.

Itemize tasks for approval


C.

Reduce repetitive tasks


D.

Minimize setup complexity


E.

Define a security strategy


F.

Generate reports and metrics


Expert Solution
Questions # 10:

During an internal code review, software called "ACE" was discovered to have a vulnerability that allows the execution of arbitrary code. The vulnerability is in a legacy, third-party vendor resource that is used by the ACE software. ACE is used worldwide and is essential for many businesses in this industry. Developers informed the Chief Information Security Officer that removal of the vulnerability will take time. Which of the following is the first action to take?

Options:

A.

Look for potential loCs in the company.


B.

Inform customers of the vulnerability.


C.

Remove the affected vendor resource from the ACE software.


D.

Develop a compensating control until the issue can be fixed permanently.


Expert Solution
Viewing page 1 out of 13 pages
Viewing questions 1-10 out of questions