Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions
Questions # 81:

While reviewing the web server logs, a security analyst notices the following snippet:

.. \ .. / .. \ .. /boot.ini

Which of the following Is belng attempted?

Options:

A.

Directory traversal


B.

Remote file inclusion


C.

Cross-site scripting


D.

Remote code execution


E.

Enumeration of /etc/passwd


Expert Solution
Questions # 82:

Which of the following best describes the key goal of the containment stage of an incident response process?

Options:

A.

To limit further damage from occurring


B.

To get services back up and running


C.

To communicate goals and objectives of theincidentresponse plan


D.

To prevent data follow-on actions by adversary exfiltration


Expert Solution
Questions # 83:

A technician is analyzing output from a popular network mapping tool for a PCI audit:

Question # 83

Which of the following best describes the output?

Options:

A.

The host is not up or responding.


B.

The host is running excessive cipher suites.


C.

The host is allowing insecure cipher suites.


D.

The Secure Shell port on this host is closed


Expert Solution
Questions # 84:

A security audit for unsecured network services was conducted, and the following output was generated:

Question # 84

Which of the following services should the security team investigate further? (Select two).

Options:

A.

21


B.

22


C.

23


D.

636


E.

1723


F.

3389


Expert Solution
Questions # 85:

A security analyst is performing vulnerability scans on the network. The analyst installs a scanner appliance, configures the subnets to scan, and begins the scan of the network. Which of the following

would be missing from a scan performed with this configuration?

Options:

A.

Operating system version


B.

Registry key values


C.

Open ports


D.

IP address


Expert Solution
Questions # 86:

A SOC manager receives a phone call from an upset customer. The customer received a vulnerability report two hours ago: but the report did not have a follow-up remediation response from an analyst. Which of the following documents should the SOC manager review to ensure the team is meeting the appropriate contractual obligations for the customer?

Options:

A.

SLA


B.

MOU


C.

NDA


D.

Limitation of liability


Expert Solution
Questions # 87:

A security analyst identifies a device on which different malware was detected multiple times, even after the systems were scanned and cleaned several times. Which of the following actions would be most effective to ensure the device does not have residual malware?

Options:

A.

Update the device and scan offline in safe mode.


B.

Replace the hard drive and reimage the device.


C.

Upgrade the device to the latest OS version.


D.

Download a secondary scanner and rescan the device.


Expert Solution
Questions # 88:

Which of the following is an important aspect that should be included in the lessons-learned step after an incident?

Options:

A.

Identify any improvements or changes in the incident response plan or procedures


B.

Determine if an internal mistake was made and who did it so they do not repeat the error


C.

Present all legal evidence collected and turn it over to iaw enforcement


D.

Discuss the financial impact of the incident to determine if security controls are well spent


Expert Solution
Questions # 89:

A security analyst has found a moderate-risk item in an organization's point-of-sale application. The organization is currently in a change freeze window and has decided that the risk is not high enough to correct at this time. Which of the following inhibitors to remediation does this scenario illustrate?

Options:

A.

Service-level agreement


B.

Business process interruption


C.

Degrading functionality


D.

Proprietary system


Expert Solution
Questions # 90:

A security manager has decided to form a special group of analysts who participate in both penetration testing and defending the company's network infrastructure during exercises. Which of the following teams should the group form in order to achieve this goal?

Options:

A.

Blue team


B.

Purple team


C.

Red team


D.

Green team


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions