Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following is the best framework for assessing how attackers use techniques over an infrastructure to exploit a target’s information assets?

Options:

A.

Structured Threat Information Expression


B.

OWASP Testing Guide


C.

Open Source Security Testing Methodology Manual


D.

Diamond Model of Intrusion Analysis


Expert Solution
Questions # 72:

Which of the following should be updated after a lessons-learned review?

Options:

A.

Disaster recovery plan


B.

Business continuity plan


C.

Tabletop exercise


D.

Incident response plan


Expert Solution
Questions # 73:

An analyst receives threat intelligence regarding potential attacks from an actor with seemingly unlimited time and resources. Which of the following best describes the threat actor attributed to the malicious activity?

Options:

A.

Insider threat


B.

Ransomware group


C.

Nation-state


D.

Organized crime


Expert Solution
Questions # 74:

Which of the following tools would work best to prevent the exposure of PII outside of an organization?

Options:

A.

PAM


B.

IDS


C.

PKI


D.

DLP


Expert Solution
Questions # 75:

Which of the following is a benefit of the Diamond Model of Intrusion Analysis?

Options:

A.

It provides analytical pivoting and identifies knowledge gaps.


B.

It guarantees that the discovered vulnerability will not be exploited again in the future.


C.

It provides concise evidence that can be used in court


D.

It allows for proactive detection and analysis of attack events


Expert Solution
Questions # 76:

A systems administrator is reviewing the output of a vulnerability scan.

INSTRUCTIONS

Review the information in each tab.

Based on the organization's environment architecture and remediation standards,

select the server to be patched within 14 days and select the appropriate technique

and mitigation.

Question # 76

Question # 76

Question # 76

Question # 76


Expert Solution
Questions # 77:

A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine the type of scan that was executed and if a false positive occurred for each device.

Instructions:

Select the Results Generated drop-down option to determine if the results were generated from a credentialed scan, non-credentialed scan, or a compliance scan.

For ONLY the credentialed and non-credentialed scans, evaluate the results for false positives and check the findings that display false positives. NOTE: If you would like to uncheck an option that is currently selected, click on the option a second time.

Lastly, based on the vulnerability scan results, identify the type of Server by dragging the Server to the results.

The Linux Web Server, File-Print Server and Directory Server are draggable.

If at any time you would like to bring back the initial state of the simulation, please select the Reset All button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

Question # 77

Question # 77


Expert Solution
Questions # 78:

An analyst notices there is an internal device sending HTTPS traffic with additional characters in the header to a known-malicious IP in another country. Which of the following describes what the analyst has noticed?

Options:

A.

Beaconing


B.

Cross-site scripting


C.

Buffer overflow


D.

PHP traversal


Expert Solution
Questions # 79:

A Chief Information Security Officer (CISO) wants to disable a functionality on a business-critical web application that is vulnerable to RCE in order to maintain the minimum risk level with minimal increased cost.

Which of the following risk treatments best describes what the CISO is looking for?

Options:

A.

Transfer


B.

Mitigate


C.

Accept


D.

Avoid


Expert Solution
Questions # 80:

A security analyst is reviewing the logs of a web server and notices that an attacker has attempted to exploit a SQL injection vulnerability. Which of the following tools can the analyst use to analyze the attack and prevent future attacks?

Options:

A.

A web application firewall


B.

A network intrusion detection system


C.

A vulnerability scanner


D.

A web proxy


Expert Solution
Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions