Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions
Questions # 31:

A company recently removed administrator rights from all of its end user workstations. An analyst uses CVSSv3.1 exploitability metrics to prioritize the vulnerabilities for the workstations and produces the following information:

Question # 31

Which of the following vulnerabilities should be prioritized for remediation?

Options:

A.

nessie.explosion


B.

vote.4p


C.

sweet.bike


D.

great.skills


Expert Solution
Questions # 32:

During a tabletop exercise, engineers discovered that an ICS could not be updated due to hardware versioning incompatibility. Which of the following is the most likely cause of this issue?

Options:

A.

Legacy system


B.

Business process interruption


C.

Degrading functionality


D.

Configuration management


Expert Solution
Questions # 33:

Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the general public, as a best practice? (Select two).

Options:

A.

Law enforcement


B.

Governance


C.

Legal


D.

Manager


E.

Public relations


F.

Human resources


Expert Solution
Questions # 34:

An analyst is reviewing processes running on a Windows host. The analyst reviews the following information:

Question # 34

Which of the following processes should the analyst review first?

Options:

A.

533


B.

740


C.

768


D.

1100


Expert Solution
Questions # 35:

An organization has experienced a breach of customer transactions. Under the terms of PCI DSS, which of the following groups should the organization report the breach to?

Options:

A.

PCI Security Standards Council


B.

Local law enforcement


C.

Federal law enforcement


D.

Card issuer


Expert Solution
Questions # 36:

A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company's business type may be able to breach the network and remain inside of it for an extended period of time.

Which of the following techniques should be performed to meet the CISO's goals?

Options:

A.

Vulnerability scanning


B.

Adversary emulation


C.

Passive discovery


D.

Bug bounty


Expert Solution
Questions # 37:

An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the following is the best step to preserve evidence?

Options:

A.

Disable the user's network account and access to web resources


B.

Make a copy of the files as a backup on the server.


C.

Place a legal hold on the device and the user's network share.


D.

Make a forensic image of the device and create a SRA-I hash.


Expert Solution
Questions # 38:

A SOC receives several alerts indicating user accounts are connecting to the company’s identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?

Options:

A.

DNS


B.

tcpdump


C.

Directory


D.

IDS


Expert Solution
Questions # 39:

During a routine review, a security analyst identifies an unusual volume of traffic going to a local network workstation. The analyst extracts the traffic to a pcap file. To analyze the content, the analyst runs the command tcpdump -n -r file.pcap udp and port 53 and receives the following output:

Question # 39

Which of the following conclusions will the analyst reach based on the pcap analysis?

Options:

A.

The traffic captured a meterpreter payload delivery.


B.

The traffic shows data exfiltration.


C.

The traffic identified a Structured Query Language Injection attack.


D.

The traffic Is associated with Domain Name System Security Extensions.


E.

The traffic is normal on a Unix-based network.


Expert Solution
Questions # 40:

An incident response team finished responding to a significant security incident. The management team has asked the lead analyst to provide an after-action report that includes lessons learned. Which of the following is the most likely reason to include lessons learned?

Options:

A.

To satisfy regulatory requirements for incident reporting


B.

To hold other departments accountable


C.

To identify areas of improvement in the incident response process


D.

To highlight the notable practices of the organization's incident response team


Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions