Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following ensures that a team receives simulated threats to evaluate incident response performance and coordination?

Options:

A.

Vulnerability assessment


B.

Incident response playbooks


C.

Tabletop exercise


D.

Cybersecurity frameworks


Expert Solution
Questions # 62:

A security analyst reviews the latest vulnerability scans and observes there are vulnerabilities with similar CVSSv3 scores but different base score metrics. Which of the following attack vectors should the analyst remediate first?

Options:

A.

CVSS 3.0/AVP/AC:L/PR:L/UI:N/S U/C:H/I:H/A:H


B.

CVSS 3.0/AV:A/AC .L/PR:L/UI:N/S:U/C:H/I:H/A:H


C.

CVSS 3.0/AV:N/AC:L/PR:L/UI:N/S;U/C:H/I:H/A:H


D.

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H


Expert Solution
Questions # 63:

The SOC receives a number of complaints regarding a recent uptick in desktop error messages that are associated with workstation access to an internal web application. An analyst, identifying a recently modified XML file on the web server, retrieves a copy of this file for review, which contains the following code:

Question # 63

Which of The following XML schema constraints would stop these desktop error messages from appearing?

Options:

A.

A white background with black text AI-generated content may be incorrect.


B.

A white background with black text AI-generated content may be incorrect.


C.

A white background with black text AI-generated content may be incorrect.


D.

A screenshot of a computer code AI-generated content may be incorrect.


Expert Solution
Questions # 64:

You are a penetration tester who is reviewing the system hardening guidelines for a company. Hardening guidelines indicate the following.

    There must be one primary server or service per device.

    Only default port should be used

    Non- secure protocols should be disabled.

    The corporate internet presence should be placed in a protected subnet

Instructions :

    Using the available tools, discover devices on the corporate network and the services running on these devices.

You must determine

    ip address of each device

    The primary server or service each device

    The protocols that should be disabled based on the hardening guidelines

Question # 64

Question # 64


Expert Solution
Questions # 65:

A software developer has been deploying web applications with common security risks to include insufficient logging capabilities. Which of the following actions would be most effective to

reduce risks associated with the application development?

Options:

A.

Perform static analyses using an integrated development environment.


B.

Deploy compensating controls into the environment.


C.

Implement server-side logging and automatic updates.


D.

Conduct regular code reviews using OWASP best practices.


Expert Solution
Questions # 66:

Several vulnerability scan reports have indicated runtime errors as the code is executing. The dashboard that lists the errors has a command-line interface for developers to check for vulnerabilities. Which of the following will enable a developer to correct this issue? (Select two).

Options:

A.

Performing dynamic application security testing


B.

Reviewing the code


C.

Fuzzing the application


D.

Debugging the code


E.

Implementing a coding standard


F.

Implementing IDS


Expert Solution
Questions # 67:

A systems administrator receives reports of an internet-accessible Linux server that is running very sluggishly. The administrator examines the server, sees a high amount of memory utilization, and suspects a DoS attack related to half-open TCP sessions consuming memory. Which of the following tools would best help to prove whether this server was experiencing this behavior?

Options:

A.

Nmap


B.

TCPDump


C.

SIEM


D.

EDR


Expert Solution
Questions # 68:

A security analyst is improving an organization's vulnerability management program. The analyst cross-checks the current reports with the system's infrastructure teams, but the reports do not accurately reflect the current patching levels. Which of the following will most likely correct the report errors?

Options:

A.

Updating the engine of the vulnerability scanning tool


B.

Installing patches through a centralized system


C.

Configuring vulnerability scans to be credentialed


D.

Resetting the scanning tool's plug-ins to default


Expert Solution
Questions # 69:

An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server?

Options:

A.

Hard disk


B.

Primary boot partition


C.

Malicious tiles


D.

Routing table


E.

Static IP address


Expert Solution
Questions # 70:

A security manager reviews the permissions for the approved users of a shared folder and finds accounts that are not on the approved access list. While investigating an incident, a user discovers data discrepancies in the file. Which of the following best describes this activity?

Options:

A.

Filesystem anomaly


B.

Illegal software


C.

Unauthorized changes


D.

Data exfiltration


Expert Solution
Viewing page 7 out of 14 pages
Viewing questions 61-70 out of questions