New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 7 out of 13 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following would help an analyst to quickly find out whether the IP address in a SIEM alert is a known-malicious IP address?

Options:

A.

Join an information sharing and analysis center specific to the company's industry.


B.

Upload threat intelligence to the IPS in STIX/TAXII format.


C.

Add data enrichment for IPS in the ingestion pipleline.


D.

Review threat feeds after viewing the SIEM alert.


Expert Solution
Questions # 62:

A security analyst wants to implement new monitoring controls in order to find abnormal account activity for traveling employees. Which of the following techniques would deliver the expected results?

Options:

A.

Malicious command interpretation


B.

Network monitoring


C.

User behavior analysis


D.

SSL inspection


Expert Solution
Questions # 63:

An organization has activated the CSIRT. A security analyst believes a single virtual server was compromised and immediately isolated from the network. Which of the following should the CSIRT conduct next?

Options:

A.

Take a snapshot of the compromised server and verify its integrity


B.

Restore the affected server to remove any malware


C.

Contact the appropriate government agency to investigate


D.

Research the malware strain to perform attribution


Expert Solution
Questions # 64:

Which of the following best describes the threat concept in which an organization works to ensure that all network users only open attachments from known sources?

Options:

A.

Hacktivist threat


B.

Advanced persistent threat


C.

Unintentional insider threat


D.

Nation-state threat


Expert Solution
Questions # 65:

A systems administrator receives reports of an internet-accessible Linux server that is running very sluggishly. The administrator examines the server, sees a high amount of memory utilization, and suspects a DoS attack related to half-open TCP sessions consuming memory. Which of the following tools would best help to prove whether this server was experiencing this behavior?

Options:

A.

Nmap


B.

TCPDump


C.

SIEM


D.

EDR


Expert Solution
Questions # 66:

A penetration tester submitted data to a form in a web application, which enabled the penetration tester to retrieve user credentials. Which of the following should be recommended for remediation of this application vulnerability?

Options:

A.

Implementing multifactor authentication on the server OS


B.

Hashing user passwords on the web application


C.

Performing input validation before allowing submission


D.

Segmenting the network between the users and the web server


Expert Solution
Questions # 67:

Using open-source intelligence gathered from technical forums, a threat actor compiles and tests a malicious downloader to ensure it will not be detected by the victim organization's endpoint security protections. Which of the following stages of the Cyber Kill Chain best aligns with the threat actor's actions?

Options:

A.

Delivery


B.

Reconnaissance


C.

Exploitation


D.

Weaponizatign


Expert Solution
Questions # 68:

An organization utilizes multiple vendors, each with its own portal that a security analyst must sign in to daily. Which of the following is the best solution for the organization to use to eliminate the need for multiple authentication credentials?

Options:

A.

API


B.

MFA


C.

SSO


D.

VPN


Expert Solution
Questions # 69:

Which of the following best describes the goal of a tabletop exercise?

Options:

A.

To test possible incident scenarios and how to react properly


B.

To perform attack exercises to check response effectiveness


C.

To understand existing threat actors and how to replicate their techniques


D.

To check the effectiveness of the business continuity plan


Expert Solution
Questions # 70:

A security team needs to demonstrate how prepared the team is in the event of a cyberattack. Which of the following would best demonstrate a real-world incident without impacting operations?

Options:

A.

Review lessons-learned documentation and create a playbook.


B.

Gather all internal incident response party members and perform a simulation.


C.

Deploy known malware and document the remediation process.


D.

Schedule a system recovery to the DR site for a few applications.


Expert Solution
Viewing page 7 out of 13 pages
Viewing questions 61-70 out of questions