New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 3 out of 13 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following best describes the importance of KPIs in an incident response exercise?

Options:

A.

To identify the personal performance of each analyst


B.

To describe how incidents were resolved


C.

To reveal what the team needs to prioritize


D.

To expose which tools should be used


Expert Solution
Questions # 22:

An employee downloads a freeware program to change the desktop to the classic look of legacy Windows. Shortly after the employee installs the program, a high volume of random DNS queries begin

to originate from the system. An investigation on the system reveals the following:

Add-MpPreference -ExclusionPath '%Program Filest\ksysconfig'

Which of the following is possibly occurring?

Options:

A.

Persistence


B.

Privilege escalation


C.

Credential harvesting


D.

Defense evasion


Expert Solution
Questions # 23:

An analyst is evaluating the following vulnerability report:

Question # 23

Which of the following vulnerability report sections provides information about the level of impact on data confidentiality if a successful exploitation occurs?

Options:

A.

Payloads


B.

Metrics


C.

Vulnerability


D.

Profile


Expert Solution
Questions # 24:

An XSS vulnerability was reported on one of the public websites of a company. The security department confirmed the finding and needs to provide a recommendation to the application owner. Which of the following recommendations will best prevent this vulnerability from being exploited? (Select two).

Options:

A.

Implement an IPS in front of the web server.


B.

Enable MFA on the website.


C.

Take the website offline until it is patched.


D.

Implement a compensating control in the source code.


E.

Configure TLS v1.3 on the website.


F.

Fix the vulnerability using a virtual patch at the WAF.


Expert Solution
Questions # 25:

An analyst is conducting routine vulnerability assessments on the company infrastructure. When performing these scans, a business-critical server crashes, and the cause is traced back to the vulnerability scanner. Which of the following is the cause of this issue?

Options:

A.

The scanner is running without an agent installed.


B.

The scanner is running in active mode.


C.

The scanner is segmented improperly.


D.

The scanner is configured with a scanning window.


Expert Solution
Questions # 26:

Which of the following is the best authentication method to secure access to sensitive data?

Options:

A.

An assigned device that generates a randomized code for login


B.

Biometrics and a device with a personalized code for login


C.

Alphanumeric/special character username and passphrase for login


D.

A one-time code received by email and push authorization for login


Expert Solution
Questions # 27:

A vulnerability scan of a web server that is exposed to the internet was recently completed. A security analyst is reviewing the resulting vector strings:

Vulnerability 1: CVSS: 3.0/AV:N/AC: L/PR: N/UI : N/S: U/C: H/I : L/A:L

Vulnerability 2: CVSS: 3.0/AV: L/AC: H/PR:N/UI : N/S: U/C: L/I : L/A: H

Vulnerability 3: CVSS: 3.0/AV:A/AC: H/PR: L/UI : R/S: U/C: L/I : H/A:L

Vulnerability 4: CVSS: 3.0/AV: P/AC: L/PR: H/UI : N/S: U/C: H/I:N/A:L

Which of the following vulnerabilities should be patched first?

Options:

A.

Vulnerability 1


B.

Vulnerability 2


C.

Vulnerability 3


D.

Vulnerability 4


Expert Solution
Questions # 28:

After updating the email client to the latest patch, only about 15% of the workforce is able to use email. Windows 10 users do not experience issues, but Windows 11 users have constant issues. Which of the

following did the change management team fail to do?

Options:

A.

Implementation


B.

Testing


C.

Rollback


D.

Validation


Expert Solution
Questions # 29:

An organization recently changed its BC and DR plans. Which of the following would best allow for the incident response team to test the changes without any impact to the business?

Options:

A.

Perform a tabletop drill based on previously identified incident scenarios.


B.

Simulate an incident by shutting down power to the primary data center.


C.

Migrate active workloads from the primary data center to the secondary location.


D.

Compare the current plan to lessons learned from previous incidents.


Expert Solution
Questions # 30:

While reviewing the web server logs a security analyst notices the following snippet

..\../..\../boot.ini

Which of the following is being attempted?

Options:

A.

Directory traversal


B.

Remote file inclusion


C.

Cross-site scripting


D.

Remote code execution


E.

Enumeration of/etc/pasawd


Expert Solution
Viewing page 3 out of 13 pages
Viewing questions 21-30 out of questions