Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions
Questions # 51:

A security analyst is tasked with prioritizing vulnerabilities for remediation. The relevant company security policies are shown below:

Security Policy 1006: Vulnerability Management

1. The Company shall use the CVSSv3.1 Base Score Metrics (Exploitability and Impact) to prioritize the remediation of security vulnerabilities.

2. In situations where a choice must be made between confidentiality and availability, the Company shall prioritize confidentiality of data over availability of systems and data.

3. The Company shall prioritize patching of publicly available systems and services over patching of internally available system.

According to the security policy, which of the following vulnerabilities should be the highest priority to patch?

A)

Question # 51

B)

Question # 51

C)

Question # 51

D)

Question # 51

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 52:

During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?

Options:

A.

Conduct regular red team exercises over the application in production


B.

Ensure that all implemented coding libraries are regularly checked


C.

Use application security scanning as part of the pipeline for the CI/CDflow


D.

Implement proper input validation for any data entry form


Expert Solution
Questions # 53:

An analyst investigated a website and produced the following:

Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-21 10:21 CDT

Nmap scan report for insecure.org (45.33.49.119)

Host is up (0.054s latency).

rDNS record for 45.33.49.119: ack.nmap.org

Not shown: 95 filtered tcp ports (no-response)

PORT STATE SERVICE VERSION

22/tcp open ssh OpenSSH 7.4 (protocol 2.0)

25/tcp closed smtp

80/tcp open http Apache httpd 2.4.6

113/tcp closed ident

443/tcp open ssl/http Apache httpd 2.4.6

Service Info: Host: issues.nmap.org

Service detection performed. Please report any incorrect results at https://nmap .org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 20.52 seconds

Which of the following syntaxes did the analyst use to discover the application versions on this vulnerable website?

Options:

A.

nmap-sS -T4 -F insecure.org


B.

nmap-0 insecure.org


C.

nmap-sV -T4 -F insecure.org


D.

nmap-A insecure.org


Expert Solution
Questions # 54:

Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in a secure environment?

Options:

A.

MOU


B.

NDA


C.

BIA


D.

SLA


Expert Solution
Questions # 55:

An organization enabled a SIEM rule to send an alert to a security analyst distribution list when ten failed logins occur within one minute. However, the control was unable to detect an attack with nine failed logins. Which of the following best represents what occurred?

Options:

A.

False positive


B.

True negative


C.

False negative


D.

True positive


Expert Solution
Questions # 56:

Which of the following is the first step that should be performed when establishing a disaster recovery plan?

Options:

A.

Agree on the goals and objectives of the plan


B.

Determine the site to be used during a disasterC Demonstrate adherence to a standard disaster recovery process


C.

Identity applications to be run during a disaster


Expert Solution
Questions # 57:

A security analyst is responding to an indent that involves a malicious attack on a network. Data closet. Which of the following best explains how are analyst should properly document the incident?

Options:

A.

Back up the configuration file for alt network devices


B.

Record and validate each connection


C.

Create a full diagram of the network infrastructure


D.

Take photos of the impacted items


Expert Solution
Questions # 58:

A security analyst reviews the following Arachni scan results for a web application that stores PII data:

Question # 58

Which of the following should be remediated first?

Options:

A.

SQL injection


B.

RFI


C.

XSS


D.

Code injection


Expert Solution
Questions # 59:

A security team conducts a lessons-learned meeting after struggling to determine who should conduct the next steps following a security event. Which of the following should the team create to address this issue?

Options:

A.

Service-level agreement


B.

Change management plan


C.

Incident response plan


D.

Memorandum of understanding


Expert Solution
Questions # 60:

A security analyst reviews a packet capture and identifies the following output as anomalous:

13:49:57.553161 TP10.203.10.17.45701>10.203.10.22.12930:Flags[FPU],seq108331482,win1024,urg0,length0

13:49:57.553162 IP10.203.10.17.45701>10.203.10.22.48968:Flags[FPU],seq108331482,win1024,urg0,length0

...

Which of the following activities explains the output?

Options:

A.

Nmap Xmas scan


B.

Nikto's web scan


C.

Socat's proxying traffic using the urgent flag


D.

Angry IP Scanner output


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions