Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 1 out of 13 pages
Viewing questions 1-10 out of questions
Questions # 1:

An analyst finds that an IP address outside of the company network that is being used to run network and vulnerability scans across external-facing assets. Which of the following steps of an attack framework is the analyst witnessing?

Options:

A.

Exploitation


B.

Reconnaissance


C.

Command and control


D.

Actions on objectives


Expert Solution
Questions # 2:

Patches for two highly exploited vulnerabilities were released on the same Friday afternoon. Information about the systems and vulnerabilities is shown in the tables below:

Question # 2

Which of the following should the security analyst prioritize for remediation?

Options:

A.

rogers


B.

brady


C.

brees


D.

manning


Expert Solution
Questions # 3:

A user downloads software that contains malware onto a computer that eventually infects numerous other systems. Which of the following has the user become?

Options:

A.

Hacklivist


B.

Advanced persistent threat


C.

Insider threat


D.

Script kiddie


Expert Solution
Questions # 4:

A security analyst is trying to identify possible network addresses from different source networks belonging to the same company and region. Which of the following shell script functions could help achieve the goal?

Options:

A.

function w() { a=$(ping -c 1 $1 | awk-F ”/” ’END{print $1}’) && echo “$1 | $a” }


B.

B. function x() { b=traceroute -m 40 $1 | awk ’END{print $1}’) && echo “$1 | $b” }


C.

C. function y() { dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F ”.in-addr” ’{print $1}’).origin.asn.cymru.com TXT +short }


D.

function z() { c=$(geoiplookup$1) && echo “$1 | $c” }


Expert Solution
Questions # 5:

An organization has noticed large amounts of data are being sent out of its network. An

analyst is identifying the cause of the data exfiltration.

INSTRUCTIONS

Select the command that generated the output in tabs 1 and 2.

Review the output text in all tabs and identify the file responsible for the malicious

behavior.

If at any time you would like to bring back the initial state of the simulation, please click

the Reset All button.

Question # 5

Question # 5

Question # 5

Question # 5

Question # 5

Question # 5

Question # 5


Expert Solution
Questions # 6:

A security analyst is tasked with prioritizing vulnerabilities for remediation. The relevant company security policies are shown below:

Security Policy 1006: Vulnerability Management

1. The Company shall use the CVSSv3.1 Base Score Metrics (Exploitability and Impact) to prioritize the remediation of security vulnerabilities.

2. In situations where a choice must be made between confidentiality and availability, the Company shall prioritize confidentiality of data over availability of systems and data.

3. The Company shall prioritize patching of publicly available systems and services over patching of internally available system.

According to the security policy, which of the following vulnerabilities should be the highest priority to patch?

A)

Question # 6

B)

Question # 6

C)

Question # 6

D)

Question # 6

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 7:

Which of the following is a useful tool for mapping, tracking, and mitigating identified threats and vulnerabilities with the likelihood and impact of occurrence?

Options:

A.

Risk register


B.

Vulnerability assessment


C.

Penetration test


D.

Compliance report


Expert Solution
Questions # 8:

Which of the following are process improvements that can be realized by implementing a SOAR solution? (Select two).

Options:

A.

Minimize security attacks


B.

Itemize tasks for approval


C.

Reduce repetitive tasks


D.

Minimize setup complexity


E.

Define a security strategy


F.

Generate reports and metrics


Expert Solution
Questions # 9:

A company brings in a consultant to make improvements to its website. After the consultant leaves. a web developer notices unusual activity on the website and submits a suspicious file containing the following code to the security team:

Question # 9

Which of the following did the consultant do?

Options:

A.

Implanted a backdoor


B.

Implemented privilege escalation


C.

Implemented clickjacking


D.

Patched the web server


Expert Solution
Questions # 10:

An attacker has just gained access to the syslog server on a LAN. Reviewing the syslog entries has allowed the attacker to prioritize possible next targets. Which of the following is this an example of?

Options:

A.

Passive network foot printing


B.

OS fingerprinting


C.

Service port identification


D.

Application versioning


Expert Solution
Viewing page 1 out of 13 pages
Viewing questions 1-10 out of questions