Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 3 out of 13 pages
Viewing questions 21-30 out of questions
Questions # 21:

Each time a vulnerability assessment team shares the regular report with other teams, inconsistencies regarding versions and patches in the existing infrastructure are discovered. Which of the following is the best solution to decrease the inconsistencies?

Options:

A.

Implementing credentialed scanning


B.

Changing from a passive to an active scanning approach


C.

Implementing a central place to manage IT assets


D.

Performing agentless scanning


Expert Solution
Questions # 22:

While reviewing web server logs, a security analyst discovers the following suspicious line:

Question # 22

Which of the following is being attempted?

Options:

A.

Remote file inclusion


B.

Command injection


C.

Server-side request forgery


D.

Reverse shell


Expert Solution
Questions # 23:

A security manager is looking at a third-party vulnerability metric (SMITTEN) to improve upon the company's current method that relies on CVSSv3. Given the following:

Question # 23

Which of the following vulnerabilities should be prioritized?

Options:

A.

Vulnerability 1


B.

Vulnerability 2


C.

Vulnerability 3


D.

Vulnerability 4


Expert Solution
Questions # 24:

A security analyst discovers an ongoing ransomware attack while investigating a phishing email. The analyst downloads a copy of the file from the email and isolates the affected workstation from the network. Which of the following activities should the analyst perform next?

Options:

A.

Wipe the computer and reinstall software


B.

Shut down the email server and quarantine it from the network.


C.

Acquire a bit-level image of the affected workstation.


D.

Search for other mail users who have received the same file.


Expert Solution
Questions # 25:

An analyst wants to ensure that users only leverage web-based software that has been pre-approved by the organization. Which of the following should be deployed?

Options:

A.

Blocklisting


B.

Allowlisting


C.

Graylisting


D.

Webhooks


Expert Solution
Questions # 26:

A company's security team is updating a section of the reporting policy that pertains to inappropriate use of resources (e.g., an employee who installs cryptominers on workstations in the office). Besides the security team, which

of the following groups should the issue be escalated to first in order to comply with industry best practices?

Options:

A.

Help desk


B.

Law enforcement


C.

Legal department


D.

Board member


Expert Solution
Questions # 27:

A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers. Which of the following actions would allow the analyst to achieve the objective?

Options:

A.

Upload the binary to an air gapped sandbox for analysis


B.

Send the binaries to the antivirus vendor


C.

Execute the binaries on an environment with internet connectivity


D.

Query the file hashes using VirusTotal


Expert Solution
Questions # 28:

Which of the following best explains the importance of network microsegmentation as part of a Zero Trust architecture?

Options:

A.

To allow policies that are easy to manage and less granular


B.

To increase the costs associated with regulatory compliance


C.

To limit how far an attack can spread


D.

To reduce hardware costs with the use of virtual appliances


Expert Solution
Questions # 29:

A SOC analyst is analyzing traffic on a network and notices an unauthorized scan. Which of the following types of activities is being observed?

Options:

A.

Potential precursor to an attack


B.

Unauthorized peer-to-peer communication


C.

Rogue device on the network


D.

System updates


Expert Solution
Questions # 30:

A Chief Information Security Officer wants to map all the attack vectors that the company faces each day. Which of the following recommendations should the company align their security controls around?

Options:

A.

OSSTMM


B.

Diamond Model Of Intrusion Analysis


C.

OWASP


D.

MITRE ATT&CK


Expert Solution
Viewing page 3 out of 13 pages
Viewing questions 21-30 out of questions