Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following best describes the reporting metric that should be utilized when measuring the degree to which a system, application, or user base is affected by an uptime availability outage?

Options:

A.

Timeline


B.

Evidence


C.

Impact


D.

Scope


Expert Solution
Questions # 52:

A security analyst needs to develop a solution to protect a high-value asset from an exploit like a recent zero-day attack. Which of the following best describes this risk management strategy?

Options:

A.

Avoid


B.

Transfer


C.

Accept


D.

Mitigate


Expert Solution
Questions # 53:

A security team identified several rogue Wi-Fi access points during the most recent network scan. The network scans occur once per quarter. Which of the following controls would best all ow the organization to identity rogue

devices more quickly?

Options:

A.

Implement a continuous monitoring policy.


B.

Implement a BYOD policy.


C.

Implement a portable wireless scanning policy.


D.

Change the frequency of network scans to once per month.


Expert Solution
Questions # 54:

A security analyst has prepared a vulnerability scan that contains all of the company's functional subnets. During the initial scan, users reported that network printers began to print pages that contained unreadable text and icons.

Which of the following should the analyst do to ensure this behavior does not oocur during subsequent vulnerability scans?

Options:

A.

Perform non-credentialed scans.


B.

Ignore embedded web server ports.


C.

Create a tailored scan for the printer subnet.


D.

Increase the threshold length of the scan timeout.


Expert Solution
Questions # 55:

A security analyst is performing vulnerability scans on the network. The analyst installs a scanner appliance, configures the subnets to scan, and begins the scan of the network. Which of the following

would be missing from a scan performed with this configuration?

Options:

A.

Operating system version


B.

Registry key values


C.

Open ports


D.

IP address


Expert Solution
Questions # 56:

While performing a dynamic analysis of a malicious file, a security analyst notices the memory address changes every time the process runs. Which of the following controls is most likely preventing the analyst from finding the proper memory address of the piece of malicious code?

Options:

A.

Address space layout randomization


B.

Data execution prevention


C.

Stack canary


D.

Code obfuscation


Expert Solution
Questions # 57:

Which of the following is a reason why proper handling and reporting of existing evidence are important for the investigation and reporting phases of an incident response?

Options:

A.

TO ensure the report is legally acceptable in case it needs to be presented in court


B.

To present a lessons-learned analysis for the incident response team


C.

To ensure the evidence can be used in a postmortem analysis


D.

To prevent the possible loss of a data source for further root cause analysis


Expert Solution
Questions # 58:

A security team is concerned about recent Layer 4 DDoS attacks against the company website. Which of the following controls would best mitigate the attacks?

Options:

A.

Block the attacks using firewall rules.


B.

Deploy an IPS in the perimeter network.


C.

Roll out a CDN.


D.

Implement a load balancer.


Expert Solution
Questions # 59:

Which of the following is the best authentication method to secure access to sensitive data?

Options:

A.

An assigned device that generates a randomized code for login


B.

Biometrics and a device with a personalized code for login


C.

Alphanumeric/special character username and passphrase for login


D.

A one-time code received by email and push authorization for login


Expert Solution
Questions # 60:

A security analyst found the following vulnerability on the company’s website:

Which of the following should be implemented to prevent this type of attack in the future?

Options:

A.

Input sanitization


B.

Output encoding


C.

Code obfuscation


D.

Prepared statements


Expert Solution
Viewing page 6 out of 13 pages
Viewing questions 51-60 out of questions