New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions
Questions # 71:

A security administrator needs to import Pll data records from the production environment to the test environment for testing purposes. Which of the following would best protect data confidentiality?

Options:

A.

Data masking


B.

Hashing


C.

Watermarking


D.

Encoding


Expert Solution
Questions # 72:

Which of the following best describes the process of requiring remediation of a known threat within a given time frame?

Options:

A.

SLA


B.

MOU


C.

Best-effort patching


D.

Organizational governance


Expert Solution
Questions # 73:

An analyst notices there is an internal device sending HTTPS traffic with additional characters in the header to a known-malicious IP in another country. Which of the following describes what the analyst has noticed?

Options:

A.

Beaconing


B.

Cross-site scripting


C.

Buffer overflow


D.

PHP traversal


Expert Solution
Questions # 74:

A security analyst is reviewing events that occurred during a possible compromise. The analyst obtains the following log:

Question # 74

Which of the following is most likely occurring, based on the events in the log?

Options:

A.

An adversary is attempting to find the shortest path of compromise.


B.

An adversary is performing a vulnerability scan.


C.

An adversary is escalating privileges.


D.

An adversary is performing a password stuffing attack..


Expert Solution
Questions # 75:

Which of the following is a KPI that is used to monitor or report on the effectiveness of an incident response reporting and communication program?

Options:

A.

Incident volume


B.

Mean time to detect


C.

Average time to patch


D.

Remediated incidents


Expert Solution
Questions # 76:

An analyst reviews a recent government alert on new zero-day threats and finds the following CVE metrics for the most critical of the vulnerabilities:

CVSS: 3.1/AV:N/AC: L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:W/RC:R

Which of the following represents the exploit code maturity of this critical vulnerability?

Options:

A.

E:U


B.

S:C


C.

RC:R


D.

AV:N


E.

AC:L


Expert Solution
Questions # 77:

Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the general public, as a best practice? (Select two).

Options:

A.

Law enforcement


B.

Governance


C.

Legal


D.

Manager


E.

Public relations


F.

Human resources


Expert Solution
Questions # 78:

A security analyst is responding to an indent that involves a malicious attack on a network. Data closet. Which of the following best explains how are analyst should properly document the incident?

Options:

A.

Back up the configuration file for alt network devices


B.

Record and validate each connection


C.

Create a full diagram of the network infrastructure


D.

Take photos of the impacted items


Expert Solution
Questions # 79:

A company classifies security groups by risk level. Any group with a high-risk classification requires multiple levels of approval for member or owner changes. Which of the following inhibitors to remediation is the company utilizing?

Options:

A.

Organizational governance


B.

MOU


C.

SLA


D.

Business process interruption


Expert Solution
Questions # 80:

An analyst is imaging a hard drive that was obtained from the system of an employee who is suspected of going rogue. The analyst notes that the initial hash of the evidence drive does not match the resultant hash of the imaged copy. Which of the following best describes the reason for the conflicting investigative findings?

Options:

A.

Chain of custody was not maintained for the evidence drive.


B.

Legal authorization was not obtained prior to seizing the evidence drive.


C.

Data integrity of the imaged drive could not be verified.


D.

Evidence drive imaging was performed without a write blocker.


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions