Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions
Questions # 11:

An analyst is evaluating the following vulnerability report:

Question # 11

Which of the following vulnerability report sections provides information about the level of impact on data confidentiality if a successful exploitation occurs?

Options:

A.

Payloads


B.

Metrics


C.

Vulnerability


D.

Profile


Expert Solution
Questions # 12:

Results of a SOC customer service evaluation indicate high levels of dissatisfaction with the inconsistent services provided after regular work hours. To address this, the SOC lead drafts a document establishing customer expectations regarding the SOC's performance and quality of services. Which of the following documents most likely fits this description?

Options:

A.

Risk management plan


B.

Vendor agreement


C.

Incident response plan


D.

Service-level agreement


Expert Solution
Questions # 13:

A security analyst needs to secure digital evidence related to an incident. The security analyst must ensure that the accuracy of the data cannot be repudiated. Which of the following should be implemented?

Options:

A.

Offline storage


B.

Evidence collection


C.

Integrity validation


D.

Legal hold


Expert Solution
Questions # 14:

A security analyst provides the management team with an after-action report for a security incident. Which of the following is the management team most likely to review in order to correct validated issues with the incident response processes?

Options:

A.

Tabletop exercise


B.

Lessons learned


C.

Root cause analysis


D.

Forensic analysis


Expert Solution
Questions # 15:

A security analyst is trying to identify possible network addresses from different source networks belonging to the same company and region. Which of the following shell script functions could help achieve the goal?

Options:

A.

function w() { a=$(ping -c 1 $1 | awk-F ”/” ’END{print $1}’) && echo “$1 | $a” }


B.

B. function x() { b=traceroute -m 40 $1 | awk ’END{print $1}’) && echo “$1 | $b” }


C.

C. function y() { dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F ”.in-addr” ’{print $1}’).origin.asn.cymru.com TXT +short }


D.

function z() { c=$(geoiplookup$1) && echo “$1 | $c” }


Expert Solution
Questions # 16:

A new cybersecurity analyst is tasked with creating an executive briefing on possible threats to the organization. Which of the following will produce the data needed for the briefing?

Options:

A.

Firewall logs


B.

Indicators of compromise


C.

Risk assessment


D.

Access control lists


Expert Solution
Questions # 17:

Which of the following best explains the importance of playbooks for incident response teams?

Options:

A.

Playbooks define compliance controls and help keep the monitoring process that is in place fully aligned with regulatory requirements as designed by international rules.


B.

Playbooks help implement mitigation controls to prevent the occurrence of incidents in accordance with internal policies and procedures as designed by the IT team.


C.

Playbooks set baseline requirements that are implemented before incidents happen to ensure the proper monitoring process in order to collect metrics and KPIs that will be used for lessons-learned procedures after a postmortem analysis.


D.

Playbooks help minimize negative impacts and restore data, systems, and operations through highly detailed, preplanned procedures that will be followed when particular types of incidents occur.


Expert Solution
Questions # 18:

An analyst is reviewing a vulnerability report and must make recommendations to the executive team. The analyst finds that most systems can be upgraded with a reboot resulting in a single downtime window. However, two of the critical systems cannot be upgraded due to a vendor appliance that the company does not have access to. Which of the following inhibitors to remediation do these systems and associated vulnerabilities best represent?

Options:

A.

Proprietary systems


B.

Legacy systems


C.

Unsupported operating systems


D.

Lack of maintenance windows


Expert Solution
Questions # 19:

A security team identified several rogue Wi-Fi access points during the most recent network scan. The network scans occur once per quarter. Which of the following controls would best all ow the organization to identity rogue

devices more quickly?

Options:

A.

Implement a continuous monitoring policy.


B.

Implement a BYOD policy.


C.

Implement a portable wireless scanning policy.


D.

Change the frequency of network scans to once per month.


Expert Solution
Questions # 20:

Which of the following responsibilities does the legal team have during an incident management event? (Select two).

Options:

A.

Coordinate additional or temporary staffing for recovery efforts.


B.

Review and approve new contracts acquired as a result of an event.


C.

Advise the Incident response team on matters related to regulatory reporting.


D.

Ensure all system security devices and procedures are in place.


E.

Conduct computer and network damage assessments for insurance.


F.

Verify that all security personnel have the appropriate clearances.


Expert Solution
Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions