Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions
Questions # 71:

An IT professional is reviewing the output from the top command in Linux. In this company, only IT and security staff are allowed to have elevated privileges. Both departments have confirmed they are not working on anything that requires elevated privileges. Based on the output below:

PID

USER

VIRT

RES

SHR

%CPU

%MEM

TIME+

COMMAND

34834

person

4980644

224288

111076

5.3

14.44

1:41.44

cinnamon

34218

person

51052

30920

23828

4.7

0.2

0:26.54

Xorg

2264

root

449628

143500

26372

14.0

3.1

0:12.38

bash

35963

xrdp

711940

42356

10560

2.0

0.2

0:06.81

xrdp

Which of the following PIDs is most likely to contribute to data exfiltration?

Options:

A.

2264


B.

34218


C.

34834


D.

35963


Expert Solution
Questions # 72:

A company is launching a new application in its internal network, where internal customers can communicate with the service desk. The security team needs to ensure the application will be able to handle unexpected strings with anomalous formats without crashing. Which of the following processes is the most applicable for testing the application to find how it would behave in such a situation?

Options:

A.

Fuzzing


B.

Coding review


C.

Debugging


D.

Static analysis


Expert Solution
Questions # 73:

The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its investment in tools and systems to protect its data. Which of the following did the CISO most likely select?

Options:

A.

PCI DSS


B.

COBIT


C.

ISO 27001


D.

ITIL


Expert Solution
Questions # 74:

K company has recently experienced a security breach via a public-facing service. Analysis of the event on the server was traced back to the following piece of code:

SELECT ’ From userjdata WHERE Username = 0 and userid8 1 or 1=1;—

Which of the following controls would be best to implement?

Options:

A.

Deploy a wireless application protocol.


B.

Remove the end-of-life component.


C.

Implement proper access control.


D.

Validate user input.


Expert Solution
Questions # 75:

An organization is conducting a pilot deployment of an e-commerce application. The application's source code is not available. Which of the following strategies should an analyst recommend to evaluate the security of the software?

Options:

A.

Static testing


B.

Vulnerability testing


C.

Dynamic testing


D.

Penetration testing


Expert Solution
Questions # 76:

Which of the following is most appropriate to use with SOAR when the security team would like to automate actions across different vendor platforms?

Options:

A.

STIX/TAXII


B.

APIs


C.

Data enrichment


D.

Threat feed


Expert Solution
Questions # 77:

During a scan of a web server in the perimeter network, a vulnerability was identified that could be exploited over port 3389. The web server is protected by a WAF. Which of the following best represents the change to overall risk associated with this vulnerability?

Options:

A.

The risk would not change because network firewalls are in use.


B.

The risk would decrease because RDP is blocked by the firewall.


C.

The risk would decrease because a web application firewall is in place.


D.

The risk would increase because the host is external facing.


Expert Solution
Questions # 78:

Which of the following entities should an incident manager work with to ensure correct processes are adhered to when communicating incident reporting to the general public, as a best practice? (Select two).

Options:

A.

Law enforcement


B.

Governance


C.

Legal


D.

Manager


E.

Public relations


F.

Human resources


Expert Solution
Questions # 79:

A security analyst has found a moderate-risk item in an organization's point-of-sale application. The organization is currently in a change freeze window and has decided that the risk is not high enough to correct at this time. Which of the following inhibitors to remediation does this scenario illustrate?

Options:

A.

Service-level agreement


B.

Business process interruption


C.

Degrading functionality


D.

Proprietary system


Expert Solution
Questions # 80:

Which of the following is the best use of automation in cybersecurity?

Options:

A.

Ensure faster incident detection, analysis, and response.


B.

Eliminate configuration errors when implementing new hardware.


C.

Lower costs by reducing the number of necessary staff.


D.

Reduce the time for internal user access requests.


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions