New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 5 out of 13 pages
Viewing questions 41-50 out of questions
Questions # 41:

A Chief Information Security Officer (CISO) wants to disable a functionality on a business-critical web application that is vulnerable to RCE in order to maintain the minimum risk level with minimal increased cost.

Which of the following risk treatments best describes what the CISO is looking for?

Options:

A.

Transfer


B.

Mitigate


C.

Accept


D.

Avoid


Expert Solution
Questions # 42:

The security operations team is required to consolidate several threat intelligence feeds due to redundant tools and portals. Which of the following will best achieve the goal and maximize results?

Options:

A.

Single pane of glass


B.

Single sign-on


C.

Data enrichment


D.

Deduplication


Expert Solution
Questions # 43:

%77%77%77%2e%69%63%65%2d%70%74%69%63%2e%63%6f%6d

Which of the following would most likely explain this behavior?

Options:

A.

The string contains obfuscated JavaScript shellcode


B.

The text is encoded and designed to bypass spam filters.


C.

The email client has a parsing error elsewhere in the message.


D.

The sandboxed PC used for testing has non-default configurations.


Expert Solution
Questions # 44:

Which of the following is the best reason to implement an MOU?

Options:

A.

To create a business process for configuration management


B.

To allow internal departments to understand security responsibilities


C.

To allow an expectation process to be defined for legacy systems


D.

To ensure that all metrics on service levels are properly reported


Expert Solution
Questions # 45:

A Chief Information Security Officer wants to implement security by design, starting …… vulnerabilities, including SQL injection, FRI, XSS, etc. Which of the following would most likely meet the requirement?

Options:

A.

Reverse engineering


B.

Known environment testing


C.

Dynamic application security testing


D.

Code debugging


Expert Solution
Questions # 46:

Which of the following items should be included in a vulnerability scan report? (Choose two.)

Options:

A.

Lessons learned


B.

Service-level agreement


C.

Playbook


D.

Affected hosts


E.

Risk score


F.

Education plan


Expert Solution
Questions # 47:

A security administrator has been notified by the IT operations department that some vulnerability reports contain an incomplete list of findings. Which of the following methods should be used to resolve

this issue?

Options:

A.

Credentialed scan


B.

External scan


C.

Differential scan


D.

Network scan


Expert Solution
Questions # 48:

AXSS vulnerability was reported on one of the non-sensitive/non-mission-critical public websites of a company. The security department confirmed the finding and needs to provide a recommendation to the application owner. Which of the following recommendations will best prevent this vulnerability from being exploited? (Select two).

Options:

A.

Implement an IPS in front of the web server.


B.

Enable MFA on the website.


C.

Take the website offline until it is patched.


D.

Implement a compensating control in the source code.


E.

Configure TLS v1.3 on the website.


F.

Fix the vulnerability using a virtual patch at the WAF.


Expert Solution
Questions # 49:

A security analyst at a company called ACME Commercial notices there is outbound traffic to a host IP that resolves to https://offce365password.acme.co. The site 's standard VPN logon page is

www.acme.com/logon. Which of the following is most likely true?

Options:

A.

This is a normal password change URL.


B.

The security operations center is performing a routine password audit.


C.

A new VPN gateway has been deployed


D.

A social engineering attack is underway


Expert Solution
Questions # 50:

Which of following would best mitigate the effects of a new ransomware attack that was not properly stopped by the company antivirus?

Options:

A.

Install a firewall.


B.

Implement vulnerability management.


C.

Deploy sandboxing.


D.

Update the application blocklist.


Expert Solution
Viewing page 5 out of 13 pages
Viewing questions 41-50 out of questions