Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following would a security analyst most likely use to compare TTPs between different known adversaries of an organization?

Options:

A.

MITRE ATTACK


B.

Cyber Kill Cham


C.

OWASP


D.

STIXTAXII


Expert Solution
Questions # 42:

A security analyst wants to implement new monitoring controls in order to find abnormal account activity for traveling employees. Which of the following techniques would deliver the expected results?

Options:

A.

Malicious command interpretation


B.

Network monitoring


C.

User behavior analysis


D.

SSL inspection


Expert Solution
Questions # 43:

A systems administrator is reviewing after-hours traffic flows from data center servers and sees regular, outgoing HTTPS connections from one of the servers to a public IP address. The server should not be making outgoing connections after hours. Looking closer, the administrator sees this traffic pattern around the clock during work hours as well. Which of the following is the most likely explanation?

Options:

A.

Command-and-control beaconing activity


B.

Data exfiltration


C.

Anomalous activity on unexpected ports


D.

Network host IP address scanning


E.

A rogue network device


Expert Solution
Questions # 44:

A security manager is looking at a third-party vulnerability metric (SMITTEN) to improve upon the company's current method that relies on CVSSv3. Given the following:

Question # 44

Which of the following vulnerabilities should be prioritized?

Options:

A.

Vulnerability 1


B.

Vulnerability 2


C.

Vulnerability 3


D.

Vulnerability 4


Expert Solution
Questions # 45:

A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attack. Which of the following best describes the current stage of the Cyber Kill Chain that the threat actor is currently operating in?

Options:

A.

Weaponization


B.

Reconnaissance


C.

Delivery


D.

Exploitation


Expert Solution
Questions # 46:
Options:

A.

Credentialed scans


B.

Individual scans


C.

Security baseline scans


D.

Agent-based scans


Expert Solution
Questions # 47:

A security analyst is viewing a recorded session that captured suspicious activity:

scanning 192.168.10.10...

scan timing: about 10% done...

...

scan completed (4 host up); scanned 4 hosts in 1348 sec.

HOSt Port State Service

192.168.10.10 1 closed unknown

192.168.10.20 1 closed unknown

192.168.10.30 1 closed unknown

192.168.10.40 1 closed unknown

Which of the following best describes the activity shown?

Options:

A.

UDP scan


B.

SYN scan


C.

XMAS tree scan


D.

Half-open scan


Expert Solution
Questions # 48:

Which of the following attributes is part of the Diamond Model of Intrusion Analysis?

Options:

A.

Delivery


B.

Weaponization


C.

Command and control


D.

Capability


Expert Solution
Questions # 49:

Several reports with sensitive information are being disclosed via file sharing services. The company would like to improve its security posture against this threat. Which of the following security controls would best support the company in this scenario?

Options:

A.

Implement step-up authentication for administrators.


B.

Improve employee training and awareness.


C.

Increase password complexity standards.


D.

Deploy mobile device management.


Expert Solution
Questions # 50:

A cloud team received an alert that unauthorized resources were being auto-provisioned. After investigating, the team suspects that crypto mining is occurring. Which of the following indicators would

most likely lead the team to this conclusion?

.

Options:

A.

High GPU utilization


B.

Bandwidth consumption


C.

Unauthorized changes


D.

Unusual traffic spikes


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 41-50 out of questions