Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 13 out of 13 pages
Viewing questions 121-130 out of questions
Questions # 121:

A Chief Information Security Officer (CISO) wants to disable a functionality on a business-critical web application that is vulnerable to RCE in order to maintain the minimum risk level with minimal increased cost.

Which of the following risk treatments best describes what the CISO is looking for?

Options:

A.

Transfer


B.

Mitigate


C.

Accept


D.

Avoid


Expert Solution
Questions # 122:

A security analyst has identified outgoing network traffic leaving the enterprise at odd times. The traffic appears to pivot across network segments and target domain servers. The traffic is then routed to a geographic location to which the company has no association. Which of the following best describes this type of threat?

Options:

A.

Hacktivist


B.

Zombie


C.

Insider threat


D.

Nation-state actor


Expert Solution
Questions # 123:

Following an attack, an analyst needs to provide a summary of the event to the Chief Information Security Officer. The summary needs to include the who-what-when information and evaluate the effectiveness of the plans in place. Which of the following incident management life cycle processes

does this describe?

Options:

A.

Business continuity plan


B.

Lessons learned


C.

Forensic analysis


D.

Incident response plan


Expert Solution
Questions # 124:

A security analyst at a company called ACME Commercial notices there is outbound traffic to a host IP that resolves to https://offce365password.acme.co. The site's standard VPN logon page is

www.acme.com/logon. Which of the following is most likely true?

Options:

A.

This is a normal password change URL.


B.

The security operations center is performing a routine password audit.


C.

A new VPN gateway has been deployed


D.

A social engineering attack is underway


Expert Solution
Questions # 125:

An organization's threat intelligence team notes a recent trend in adversary privilege escalation procedures. Multiple threat groups have been observed utilizing native Windows tools to bypass system controls and execute commands with privileged credentials. Which of the following controls would be most effective to reduce the rate of success of such attempts?

Options:

A.

Disable administrative accounts for any operations.


B.

Implement MFA requirements for all internal resources.


C.

Harden systems by disabling or removing unnecessary services.


D.

Implement controls to block execution of untrusted applications.


Expert Solution
Questions # 126:

A security analyst is assisting a software engineer with the development of a custom log collection and alerting tool (SIEM) for a proprietary system. The analyst is concerned that the tool will not detect known attacks and behavioral IoCs. Which of the following should be configured in order to resolve this issue?

Options:

A.

Randomly generate and store all possible file hash values.


B.

Create a default rule to alert on any change to the system.


C.

Integrate with an open-source threat intelligence feed.


D.

Manually add known threat signatures into the tool.


Expert Solution
Questions # 127:

An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server?

Options:

A.

Hard disk


B.

Primary boot partition


C.

Malicious tiles


D.

Routing table


E.

Static IP address


Expert Solution
Questions # 128:

Which of the following techniques can help a SOC team to reduce the number of alerts related to the internal security activities that the analysts have to triage?

Options:

A.

Enrich the SIEM-ingested data to include all data required for triage.


B.

Schedule a task to disable alerting when vulnerability scans are executing.


C.

Filter all alarms in the SIEM with low severity.


D.

Add a SOAR rule to drop irrelevant and duplicated notifications.


Expert Solution
Questions # 129:

A security analyst is improving an organization's vulnerability management program. The analyst cross-checks the current reports with the system's infrastructure teams, but the reports do not accurately reflect the current patching levels. Which of the following will most likely correct the report errors?

Options:

A.

Updating the engine of the vulnerability scanning tool


B.

Installing patches through a centralized system


C.

Configuring vulnerability scans to be credentialed


D.

Resetting the scanning tool's plug-ins to default


Expert Solution
Viewing page 13 out of 13 pages
Viewing questions 121-130 out of questions