Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 7 out of 13 pages
Viewing questions 61-70 out of questions
Questions # 61:

A security analyst needs to secure digital evidence related to an incident. The security analyst must ensure that the accuracy of the data cannot be repudiated. Which of the following should be implemented?

Options:

A.

Offline storage


B.

Evidence collection


C.

Integrity validation


D.

Legal hold


Expert Solution
Questions # 62:

A cloud team received an alert that unauthorized resources were being auto-provisioned. After investigating, the team suspects that crypto mining is occurring. Which of the following indicators would

most likely lead the team to this conclusion?

.

Options:

A.

High GPU utilization


B.

Bandwidth consumption


C.

Unauthorized changes


D.

Unusual traffic spikes


Expert Solution
Questions # 63:

A development team is preparing to roll out a beta version of a web application and wants to quickly test for vulnerabilities, including SQL injection, path traversal, and cross-site scripting. Which of the following tools would the security team most likely recommend to perform this test?

Options:

A.

Has heat


B.

OpenVAS


C.

OWASP ZAP


D.

Nmap


Expert Solution
Questions # 64:

During an incident, a security analyst discovers a large amount of Pll has been emailed externally from an employee to a public email address. The analyst finds that the external email is the employee's

personal email. Which of the following should the analyst recommend be done first?

Options:

A.

Place a legal hold on the employee's mailbox.


B.

Enable filtering on the web proxy.


C.

Disable the public email access with CASB.


D.

Configure a deny rule on the firewall.


Expert Solution
Questions # 65:

An employee received a phishing email that contained malware targeting the company. Which of the following is the best way for a security analyst to get more details about the malware and avoid disclosing information?

Options:

A.

Upload the malware to the VirusTotal website


B.

Share the malware with the EDR provider


C.

Hire an external consultant to perform the analysis


D.

Use a local sandbox in a microsegmented environment


Expert Solution
Questions # 66:

A company receives a penetration test report summary from a third party. The report summary indicates a proxy has some patches that need to be applied. The proxy is sitting in a rack and is not being

used, as the company has replaced it with a new one. The CVE score of the vulnerability on the proxy is a 9.8. Which of the following best practices should the company follow with this proxy?

Options:

A.

Leave the proxy as is.


B.

Decomission the proxy.


C.

Migrate the proxy to the cloud.


D.

Patch the proxy


Expert Solution
Questions # 67:

A systems administrator receives several reports about emails containing phishing links. The hosting domain is always different, but the URL follows a specific pattern of characters. Which of the following is the best way for the administrator to find more messages that were not reported?

Options:

A.

Search email logs for a regular expression


B.

Open a support ticket with the email hosting provider


C.

Send a memo to all staff asking them to report suspicious emails


D.

Query firewall logs for any traffic with a suspicious website


Expert Solution
Questions # 68:

Given the following CVSS string-

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/3:U/C:K/I:K/A:H

Which of the following attributes correctly describes this vulnerability?

Options:

A.

A user is required to exploit this vulnerability.


B.

The vulnerability is network based.


C.

The vulnerability does not affect confidentiality.


D.

The complexity to exploit the vulnerability is high.


Expert Solution
Questions # 69:

A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a terminable offense, the SOC analyst collects the authentication logs, web logs, and temporary files, reflecting the web searches from the user's workstation, to build the case for the investigation. Which of the following is the best way to ensure that the investigation complies with HR or privacy policies?

Options:

A.

Create a timeline of events detailinq the date stamps, user account hostname and IP information associated with the activities


B.

Ensure that the case details do not reflect any user-identifiable information Password protect the evidence and restrict access to personnel related to the investigation


C.

Create a code name for the investigation in the ticketing system so that all personnel with access will not be able to easily identity the case as an HR-related investigation


D.

Notify the SOC manager for awareness after confirmation that the activity was intentional


Expert Solution
Questions # 70:

Which of the following will most likely ensure that mission-critical services are available in the event of an incident?

Options:

A.

Business continuity plan


B.

Vulnerability management plan


C.

Disaster recovery plan


D.

Asset management plan


Expert Solution
Viewing page 7 out of 13 pages
Viewing questions 61-70 out of questions