New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions
Questions # 31:

After a security assessment was done by a third-party consulting firm, the cybersecurity program recommended integrating DLP and CASB to reduce analyst alert fatigue. Which of the following is the best possible outcome that this effort hopes to achieve?

Options:

A.

SIEM ingestion logs are reduced by 20%.


B.

Phishing alerts drop by 20%.


C.

False positive rates drop to 20%.


D.

The MTTR decreases by 20%.


Expert Solution
Questions # 32:

A zero-day command injection vulnerability was published. A security administrator is analyzing the following logs for evidence of adversaries attempting to exploit the vulnerability:

Question # 32

Which of the following log entries provides evidence of the attempted exploit?

Options:

A.

Log entry 1


B.

Log entry 2


C.

Log entry 3


D.

Log entry 4


Expert Solution
Questions # 33:

A security team identified several rogue Wi-Fi access points during the most recent network scan. The network scans occur once per quarter. Which of the following controls would best all ow the organization to identity rogue

devices more quickly?

Options:

A.

Implement a continuous monitoring policy.


B.

Implement a BYOD policy.


C.

Implement a portable wireless scanning policy.


D.

Change the frequency of network scans to once per month.


Expert Solution
Questions # 34:

Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?

Options:

A.

Develop a call tree to inform impacted users


B.

Schedule a review with all teams to discuss what occurred


C.

Create an executive summary to update company leadership


D.

Review regulatory compliance with public relations for official notification


Expert Solution
Questions # 35:

To minimize the impact of a security incident in a heavily regulated company, a cybersecurity analyst has configured audit settings in the organization's cloud services. Which of the following security controls has the analyst configured?

Options:

A.

Preventive


B.

Corrective


C.

Directive


D.

Detective


Expert Solution
Questions # 36:

Which of the following would eliminate the need for different passwords for a variety or internal application?

Options:

A.

CASB


B.

SSO


C.

PAM


D.

MFA


Expert Solution
Questions # 37:

After an upgrade to a new EDR, a security analyst received reports that several endpoints were not communicating with the SaaS provider to receive critical threat signatures. To comply with the incident response playbook, the security analyst was required to validate connectivity to ensure communications. The security analyst ran a command that provided the following output:

    ComputerName: comptia007

    RemotePort: 443

    InterfaceAlias: Ethernet 3

    TcpTestSucceeded: False

Which of the following did the analyst use to ensure connectivity?

Options:

A.

nmap


B.

tnc


C.

ping


D.

tracert


Expert Solution
Questions # 38:

A cryptocurrency service company is primarily concerned with ensuring the accuracy of the data on one of its systems. A security analyst has been tasked with prioritizing vulnerabilities for remediation for the system. The analyst will use the following CVSSv3.1 impact metrics for prioritization:

Question # 38

Which of the following vulnerabilities should be prioritized for remediation?

Options:

A.

1


B.

2


C.

3


D.

4


Expert Solution
Questions # 39:

An analyst discovers unusual outbound connections to an IP that was previously blocked at the web proxy and firewall. Upon further investigation, it appears that the proxy and firewall rules that were in place were removed by a service account that is not recognized. Which of the following parts of the Cyber Kill Chain does this describe?

Options:

A.

Delivery


B.

Command and control


C.

Reconnaissance


D.

Weaporization


Expert Solution
Questions # 40:

An incident response team is working with law enforcement to investigate an active web server compromise. The decision has been made to keep the server running and to implement compensating controls for a period of time. The web service must be accessible from the internet via the reverse proxy and must connect to a database server. Which of the following compensating controls will help contain the adversary while meeting the other requirements? (Select two).

Options:

A.

Drop the tables on the database server to prevent data exfiltration.


B.

Deploy EDR on the web server and the database server to reduce the adversaries capabilities.


C.

Stop the httpd service on the web server so that the adversary can not use web exploits


D.

use micro segmentation to restrict connectivity to/from the web and database servers.


E.

Comment out the HTTP account in the / etc/passwd file of the web server


F.

Move the database from the database server to the web server.


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions