New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following responsibilities does the legal team have during an incident management event? (Select two).

Options:

A.

Coordinate additional or temporary staffing for recovery efforts.


B.

Review and approve new contracts acquired as a result of an event.


C.

Advise the Incident response team on matters related to regulatory reporting.


D.

Ensure all system security devices and procedures are in place.


E.

Conduct computer and network damage assessments for insurance.


F.

Verify that all security personnel have the appropriate clearances.


Expert Solution
Questions # 52:

A security analyst would like to integrate two different SaaS-based security tools so that one tool can notify the other in the event a threat is detected. Which of the following should the analyst utilize to best accomplish this goal?

Options:

A.

SMB share


B.

API endpoint


C.

SMTP notification


D.

SNMP trap


Expert Solution
Questions # 53:

A company is concerned with finding sensitive file storage locations that are open to the public. The current internal cloud network is flat. Which of the following is the best solution to secure the network?

Options:

A.

Implement segmentation with ACLs.


B.

Configure logging and monitoring to the SIEM.


C.

Deploy MFA to cloud storage locations.


D.

Roll out an IDS.


Expert Solution
Questions # 54:

A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?

Options:

A.

Data enrichment


B.

Security control plane


C.

Threat feed combination


D.

Single pane of glass


Expert Solution
Questions # 55:

Which of the following does "federation" most likely refer to within the context of identity and access management?

Options:

A.

Facilitating groups of users in a similar function or profile to system access that requires elevated or conditional access


B.

An authentication mechanism that allows a user to utilize one set of credentials to access multiple domains


C.

Utilizing a combination of what you know, who you are, and what you have to grant authentication to a user


D.

Correlating one's identity with the attributes and associated applications the user has access to


Expert Solution
Questions # 56:

A cybersecurity analyst is participating with the DLP project team to classify the organization's data. Which of the following is the primary purpose for classifying data?

Options:

A.

To identify regulatory compliance requirements


B.

To facilitate the creation of DLP rules


C.

To prioritize IT expenses


D.

To establish the value of data to the organization


Expert Solution
Questions # 57:

The management team requests monthly KPI reports on the company's cybersecurity program. Which of the following KPIs would identify how long a security threat goes unnoticed in the environment?

Options:

A.

Employee turnover


B.

Intrusion attempts


C.

Mean time to detect


D.

Level of preparedness


Expert Solution
Questions # 58:

Which of the following is often used to keep the number of alerts to a manageable level when establishing a process to track and analyze violations?

Options:

A.

Log retention


B.

Log rotation


C.

Maximum log size


D.

Threshold value


Expert Solution
Questions # 59:

Several reports with sensitive information are being disclosed via file sharing services. The company would like to improve its security posture against this threat. Which of the following security controls would best support the company in this scenario?

Options:

A.

Implement step-up authentication for administrators.


B.

Improve employee training and awareness.


C.

Increase password complexity standards.


D.

Deploy mobile device management.


Expert Solution
Questions # 60:

Several incidents have occurred with a legacy web application that has had little development work completed. Which of the following is the most likely cause of the incidents?

Options:

A.

Misconfigured web application firewall


B.

Data integrity failure


C.

Outdated libraries


D.

Insufficient logging


Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions