Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 12 out of 13 pages
Viewing questions 111-120 out of questions
Questions # 111:

An analyst is examining events in multiple systems but is having difficulty correlating data points. Which of the following is most likely the issue with the system?

Options:

A.

Access rights


B.

Network segmentation


C.

Time synchronization


D.

Invalid playbook


Expert Solution
Questions # 112:

A security analyst is trying to validate the results of a web application scan with Burp Suite. The security analyst performs the following:

Question # 112

Which of the following vulnerabilitles Is the securlty analyst trylng to valldate?

Options:

A.

SQL injection


B.

LFI


C.

XSS


D.

CSRF


Expert Solution
Questions # 113:

Which of the following concepts is using an API to insert bulk access requests from a file into an identity management system an example of?

Options:

A.

Command and control


B.

Data enrichment


C.

Automation


D.

Single sign-on


Expert Solution
Questions # 114:

An organization needs to bring in data collection and aggregation from various endpoints. Which of the following is the best tool to deploy to help analysts gather this data?

Options:

A.

DLP


B.

NAC


C.

EDR


D.

NIDS


Expert Solution
Questions # 115:

A security analyst discovers an LFI vulnerability that can be exploited to extract credentials from the underlying host. Which of the following patterns can the security analyst use to search the web server

logs for evidence of exploitation of that particular vulnerability?

Options:

A.

/etc/ shadow


B.

curl localhost


C.

; printenv


D.

cat /proc/self/


Expert Solution
Questions # 116:

During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related to its volatility level?

Options:

A.

Disk contents


B.

Backup data


C.

Temporary files


D.

Running processes


Expert Solution
Questions # 117:

A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the following implications should be considered on the new hybrid environment?

Options:

A.

The current scanners should be migrated to the cloud


B.

Cloud-specific misconfigurations may not be detected by the current scanners


C.

Existing vulnerability scanners cannot scan laaS systems


D.

Vulnerability scans on cloud environments should be performed from the cloud


Expert Solution
Questions # 118:

During a security test, a security analyst found a critical application with a buffer overflow vulnerability. Which of the following would be best to mitigate the vulnerability at the application level?

Options:

A.

Perform OS hardening.


B.

Implement input validation.


C.

Update third-party dependencies.


D.

Configure address space layout randomization.


Expert Solution
Questions # 119:

A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?

Options:

A.

Code analysis


B.

Static analysis


C.

Reverse engineering


D.

Fuzzing


Expert Solution
Questions # 120:

A security analyst receives the below information about the company's systems. They need to prioritize which systems should be given the resources to improve security.

Host

OS

Key Software

AV

Server 1

Windows Server 2008 R2

Microsoft IIS

Kaspersky

Server 2

Ubuntu Server 22.04 LTS

Apache 2.4.29

None

Computer 1

Windows 11 Professional

N/A

Windows Defender

Computer 2

Windows 10 Professional

N/A

Windows Defender

Which of the following systems should the analyst remediate first?

Options:

A.

Computer 1


B.

Server 1


C.

Computer 2


D.

Server 2


Expert Solution
Viewing page 12 out of 13 pages
Viewing questions 111-120 out of questions