Pass the CompTIA CompTIA CySA+ CS0-003 Questions and answers with CertsForce

Viewing page 9 out of 13 pages
Viewing questions 81-90 out of questions
Questions # 81:

A company is in the process of implementing a vulnerability management program, and there are concerns about granting the security team access to sensitive data. Which of the following scanning methods can be implemented to reduce the access to systems while providing the most accurate vulnerability scan results?

Options:

A.

Credentialed network scanning


B.

Passive scanning


C.

Agent-based scanning


D.

Dynamic scanning


Expert Solution
Questions # 82:

Which of the following is a commonly used four-component framework to communicate threat actor behavior?

Options:

A.

STRIDE


B.

Diamond Model of Intrusion Analysis


C.

Cyber Kill Chain


D.

MITRE ATT&CK


Expert Solution
Questions # 83:

An email hosting provider added a new data center with new public IP addresses. Which of the following most likely needs to be updated to ensure emails from the new data center do not get blocked by spam filters?

Options:

A.

DKIM


B.

SPF


C.

SMTP


D.

DMARC


Expert Solution
Questions # 84:

A network security analyst for a large company noticed unusual network activity on a critical system. Which of the following tools should the analyst use to analyze network traffic to search for malicious activity?

Options:

A.

WAF


B.

Wireshark


C.

EDR


D.

Nmap


Expert Solution
Questions # 85:

An incident response analyst is investigating the root cause of a recent malware outbreak. Initial binary analysis indicates that this malware disables host security services and performs cleanup routines on it infected hosts, including deletion of initial dropper and removal of event log entries and prefetch files from the host. Which of the following data sources would most likely reveal evidence of the root cause?

(Select two).

Options:

A.

Creation time of dropper


B.

Registry artifacts


C.

EDR data


D.

Prefetch files


E.

File system metadata


F.

Sysmon event log


Expert Solution
Questions # 86:

A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine the type of scan that was executed and if a false positive occurred for each device.

Instructions:

Select the Results Generated drop-down option to determine if the results were generated from a credentialed scan, non-credentialed scan, or a compliance scan.

For ONLY the credentialed and non-credentialed scans, evaluate the results for false positives and check the findings that display false positives. NOTE: If you would like to uncheck an option that is currently selected, click on the option a second time.

Lastly, based on the vulnerability scan results, identify the type of Server by dragging the Server to the results.

The Linux Web Server, File-Print Server and Directory Server are draggable.

If at any time you would like to bring back the initial state of the simulation, please select the Reset All button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

Question # 86

Question # 86


Expert Solution
Questions # 87:

A new cybersecurity analyst is tasked with creating an executive briefing on possible threats to the organization. Which of the following will produce the data needed for the briefing?

Options:

A.

Firewall logs


B.

Indicators of compromise


C.

Risk assessment


D.

Access control lists


Expert Solution
Questions # 88:

A security analyst is investigating an unusually high volume of requests received on a web server. Based on the following command and output:

access_log - [21/May/2024 13:19:06] "GET /newyddion HTTP/1.1" 404 -

access_log - [21/May/2024 13:19:06] "GET /1970 HTTP/1.1" 404 -

access_log - [21/May/2024 13:19:06] "GET /dopey HTTP/1.1" 404 -

...

Which of the following best describes the activity that the analyst will confirm?

Options:

A.

SQL injection


B.

Directory brute force


C.

Remote command execution


D.

Cross-site scripting


Expert Solution
Questions # 89:

An analyst investigated a website and produced the following:

Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-21 10:21 CDT

Nmap scan report for insecure.org (45.33.49.119)

Host is up (0.054s latency).

rDNS record for 45.33.49.119: ack.nmap.org

Not shown: 95 filtered tcp ports (no-response)

PORT STATE SERVICE VERSION

22/tcp open ssh OpenSSH 7.4 (protocol 2.0)

25/tcp closed smtp

80/tcp open http Apache httpd 2.4.6

113/tcp closed ident

443/tcp open ssl/http Apache httpd 2.4.6

Service Info: Host: issues.nmap.org

Service detection performed. Please report any incorrect results at https://nmap .org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 20.52 seconds

Which of the following syntaxes did the analyst use to discover the application versions on this vulnerable website?

Options:

A.

nmap-sS -T4 -F insecure.org


B.

nmap-0 insecure.org


C.

nmap-sV -T4 -F insecure.org


D.

nmap-A insecure.org


Expert Solution
Questions # 90:

The Chief Information Security Officer for an organization recently received approval to install a new EDR solution. Following the installation, the number of alerts that require remediation by an analyst has tripled. Which of the following should the organization utilize to best centralize the workload for the internal security team? (Select two).

Options:

A.

SOAR


B.

SIEM


C.

MSP


D.

NGFW


E.

XDR


F.

DLP


Expert Solution
Viewing page 9 out of 13 pages
Viewing questions 81-90 out of questions