Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 2 out of 13 pages
Viewing questions 11-20 out of questions
Questions # 11:

A security analyst reviews a SIEM alert related to a suspicious email and wants to verify the authenticity of the message:

SPF = PASS

DKIM = FAIL

DMARC = FAIL

Which of the following did the analyst most likely discover?

Options:

A.

An insider threat altered email security records to mask suspicious DNS resolution traffic.


B.

The message was sent from an authorized mail server but was not signed.


C.

Log normalization corrupted the data as it was brought into the central repository.


D.

The email security software did not process all of the records correctly.


Expert Solution
Questions # 12:

An analyst is conducting monitoring against an authorized team that win perform adversarial techniques. The analyst interacts with the team twice per day to set the stage for the techniques to be used. Which of the following teams is the analyst a member of?

Options:

A.

Orange team


B.

Blue team


C.

Red team


D.

Purple team


Expert Solution
Questions # 13:

During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?

Options:

A.

Conduct regular red team exercises over the application in production


B.

Ensure that all implemented coding libraries are regularly checked


C.

Use application security scanning as part of the pipeline for the CI/CDflow


D.

Implement proper input validation for any data entry form


Expert Solution
Questions # 14:

A Chief Information Security Officer has requested a dashboard to share critical vulnerability management goals with company leadership.

Which of the following would be the best to include in the dashboard?

Options:

A.

KPI


B.

MOU


C.

SLO


D.

SLA


Expert Solution
Questions # 15:

A security analyst reviews a packet capture and identifies the following output as anomalous:

13:49:57.553161 TP10.203.10.17.45701>10.203.10.22.12930:Flags[FPU],seq108331482,win1024,urg0,length0

13:49:57.553162 IP10.203.10.17.45701>10.203.10.22.48968:Flags[FPU],seq108331482,win1024,urg0,length0

...

Which of the following activities explains the output?

Options:

A.

Nmap Xmas scan


B.

Nikto's web scan


C.

Socat's proxying traffic using the urgent flag


D.

Angry IP Scanner output


Expert Solution
Questions # 16:

The vulnerability analyst reviews threat intelligence regarding emerging vulnerabilities affecting workstations that are used within the company:

Question # 16

Which of the following vulnerabilities should the analyst be most concerned about, knowing that end users frequently click on malicious links sent via email?

Options:

A.

Vulnerability A


B.

Vulnerability B


C.

Vulnerability C


D.

Vulnerability D


Expert Solution
Questions # 17:

An analyst needs to provide recommendations based on a recent vulnerability scan:

Question # 17

Which of the following should the analyst recommend addressing to ensure potential vulnerabilities are identified?

Options:

A.

SMB use domain SID to enumerate users


B.

SYN scanner


C.

SSL certificate cannot be trusted


D.

Scan not performed with admin privileges


Expert Solution
Questions # 18:

A systems administrator is reviewing after-hours traffic flows from data center servers and sees regular, outgoing HTTPS connections from one of the servers to a public IP address. The server should not be making outgoing connections after hours. Looking closer, the administrator sees this traffic pattern around the clock during work hours as well. Which of the following is the most likely explanation?

Options:

A.

Command-and-control beaconing activity


B.

Data exfiltration


C.

Anomalous activity on unexpected ports


D.

Network host IP address scanning


E.

A rogue network device


Expert Solution
Questions # 19:

Which of the following documents sets requirements and metrics for a third-party response during an event?

Options:

A.

BIA


B.

DRP


C.

SLA


D.

MOU


Expert Solution
Questions # 20:

Which of following would best mitigate the effects of a new ransomware attack that was not properly stopped by the company antivirus?

Options:

A.

Install a firewall.


B.

Implement vulnerability management.


C.

Deploy sandboxing.


D.

Update the application blocklist.


Expert Solution
Viewing page 2 out of 13 pages
Viewing questions 11-20 out of questions