Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions
Questions # 21:

A security analyst must preserve a system hard drive that was involved in a litigation request Which of the following is the best method to ensure the data on the device is not modified?

Options:

A.

Generate a hash value and make a backup image.


B.

Encrypt the device to ensure confidentiality of the data.


C.

Protect the device with a complex password.


D.

Perform a memory scan dump to collect residual data.


Expert Solution
Questions # 22:

A security analyst needs to prioritize vulnerabilities for patching. Given the following vulnerability and system information:

Question # 22

Which of the following systems should the analyst patch first?

Options:

A.

System 1


B.

System 2


C.

System 3


D.

System 4


E.

System 5


F.

System 6


Expert Solution
Questions # 23:

New employees in an organization have been consistently plugging in personal webcams despite the company policy prohibiting use of personal devices. The SOC manager discovers that new employees are not aware of the company policy. Which of the following will the SOC manager most likely recommend to help ensure new employees are accountable for following the company policy?

Options:

A.

Human resources must email a copy of a user agreement to all new employees


B.

Supervisors must get verbal confirmation from new employees indicating they have read the user agreement


C.

All new employees must take a test about the company security policy during the cjitoardmg process


D.

All new employees must sign a user agreement to acknowledge the company security policy


Expert Solution
Questions # 24:

The security team is reviewing a list of vulnerabilities present on the environment, and they want to prioritize the remediation based on the CVSS v4.0 metrics:

Question # 24

Which of the following vulnerabilities should the security manager request to fix first?

Options:

A.

System A


B.

System E


C.

System D


D.

System B


E.

System C


Expert Solution
Questions # 25:

A security analyst is responding to an incident that involves a malicious attack on a network data closet. Which of the following best explains how the analyst should properly document the incident?

Options:

A.

Back up the configuration file for all network devices.


B.

Record and validate each connection.


C.

Create a full diagram of the network infrastructure.


D.

Take photos of the impacted items.


Expert Solution
Questions # 26:

Which of the following is a circumstance in which a security operations manager would most likely consider using automation?

Options:

A.

The generation of NIDS rules based on received STIX messages


B.

The fulfillment of privileged access requests to enterprise domain controllers


C.

The verification of employee identities prior to initial PKI enrollment


D.

The analysis of suspected malware binaries captured by an email gateway


Expert Solution
Questions # 27:

Due to an incident involving company devices, an incident responder needs to take a mobile phone to the lab for further investigation. Which of the following tools should be used to maintain the integrity of the mobile phone while it is transported? (Select two).

Options:

A.

Signal-shielded bag


B.

Tamper-evident seal


C.

Thumb drive


D.

Crime scene tape


E.

Write blocker


F.

Drive duplicator


Expert Solution
Questions # 28:

A security operations center analyst is using the command line to display specific traffic. The analyst uses the following command:

tshark -r file.pcap -Y "http or udp"

Which of the following will the command line display?

Options:

A.

Encrypted web requests and Domain Name System (DNS) traffic


B.

Unencrypted web requests and DNS traffic


C.

Neither encrypted nor unencrypted web and DNS traffic


D.

Both encrypted and unencrypted web and DNS traffic


Expert Solution
Questions # 29:

During a training exercise, a security analyst must determine the vulnerabilities to prioritize. The analyst reviews the following vulnerability scan output:

Question # 29

Which of the following issues should the analyst address first?

Options:

A.

Allows anonymous read access to /etc/passwd


B.

Allows anonymous read access via any FTP connection


C.

Microsoft Defender security definition updates disabled


D.

less command allows for escape exploit via terminal


Expert Solution
Questions # 30:

During a recent site survey. an analyst discovered a rogue wireless access point on the network. Which of the following actions should be taken first to protect the network while preserving evidence?

Options:

A.

Run a packet sniffer to monitor traffic to and from the access point.


B.

Connect to the access point and examine its log files.


C.

Identify who is connected to the access point and attempt to find the attacker.


D.

Disconnect the access point from the network


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 21-30 out of questions