Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions
Questions # 31:

A security analyst is reviewing the following alert that was triggered by FIM on a critical system:

Question # 31

Which of the following best describes the suspicious activity that is occurring?

Options:

A.

A fake antivirus program was installed by the user.


B.

A network drive was added to allow exfiltration of data


C.

A new program has been set to execute on system start


D.

The host firewall on 192.168.1.10 was disabled.


Expert Solution
Questions # 32:

Which of the following security operations tasks are ideal for automation?

Options:

A.

Suspicious file analysis: Look for suspicious-looking graphics in a folder. Create subfolders in the original folder based on category of graphics found. Move the suspicious graphics to the appropriate subfolder


B.

Firewall IoC block actions:Examine the firewall logs for IoCs from the most recently published zero-day exploitTake mitigating actions in the firewall to block the behavior found in the logsFollow up on any false positives that were caused by the block rules


C.

Security application user errors:Search the error logs for signs of users having trouble with the security applicationLook up the user's phone numberCall the user to help with any questions about using the application


D.

Email header analysis:Check the email header for a phishing confidence metric greater than or equal to fiveAdd the domain of sender to the block listMove the email to quarantine


Expert Solution
Questions # 33:

Following a recent security incident, the Chief Information Security Officer is concerned with improving visibility and reporting of malicious actors in the environment. The goal is to reduce the time to prevent lateral movement and potential data exfiltration. Which of the following techniques will best achieve the improvement?

Options:

A.

Mean time to detect


B.

Mean time to respond


C.

Mean time to remediate


D.

Service-level agreement uptime


Expert Solution
Questions # 34:

A security analyst runs the following command:

# nmap -T4 -F 192.168.30.30

Starting nmap 7.6

Host is up (0.13s latency)

PORT STATE SERVICE

23/tcp open telnet

443/tcp open https

636/tcp open ldaps

Which of the following should the analyst recommend first to harden the system?

Options:

A.

Disable all protocols that do not use encryption.


B.

Configure client certificates for domain services.


C.

Ensure that this system is behind a NGFW.


D.

Deploy a publicly trusted root CA for secure websites.


Expert Solution
Questions # 35:

A security analyst observed the following activity from a privileged account:

. Accessing emails and sensitive information

. Audit logs being modified

. Abnormal log-in times

Which of the following best describes the observed activity?

Options:

A.

Irregular peer-to-peer communication


B.

Unauthorized privileges


C.

Rogue devices on the network


D.

Insider attack


Expert Solution
Questions # 36:

An organization conducted a web application vulnerability assessment against the corporate website, and the following output was observed:

Question # 36

Which of the following tuning recommendations should the security analyst share?

Options:

A.

Set an Http Only flag to force communication by HTTPS.


B.

Block requests without an X-Frame-Options header.


C.

Configure an Access-Control-Allow-Origin header to authorized domains.


D.

Disable the cross-origin resource sharing header.


Expert Solution
Questions # 37:

During a tabletop exercise, engineers discovered that an ICS could not be updated due to hardware versioning incompatibility. Which of the following is the most likely cause of this issue?

Options:

A.

Legacy system


B.

Business process interruption


C.

Degrading functionality


D.

Configuration management


Expert Solution
Questions # 38:

A security analyst has just received an incident ticket regarding a ransomware attack. Which of the following would most likely help an analyst properly triage the ticket?

Options:

A.

Incident response plan


B.

Lessons learned


C.

Playbook


D.

Tabletop exercise


Expert Solution
Questions # 39:

An analyst views the following log entries:

Question # 39

The organization has a partner vendor with hosts in the 216.122.5.x range. This partner vendor is required to have access to monthly reports and is the only external vendor with authorized access. The organization prioritizes incident investigation according to the following hierarchy: unauthorized data disclosure is more critical than denial of service attempts.

which are more important than ensuring vendor data access.

Based on the log files and the organization's priorities, which of the following hosts warrants additional investigation?

Options:

A.

121.19.30.221


B.

134.17.188.5


C.

202.180.1582


D.

216.122.5.5


Expert Solution
Questions # 40:

The Chief Information Security Officer is directing a new program to reduce attack surface risks and threats as part of a zero trust approach. The IT security team is required to come up with priorities for the program. Which of the following is the best priority based on common attack frameworks?

Options:

A.

Reduce the administrator and privileged access accounts


B.

Employ a network-based IDS


C.

Conduct thorough incident response


D.

Enable SSO to enterprise applications


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 31-40 out of questions