Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA CS0-003 Practice Exam with Questions & Answers | Set: 10

Questions 91

A security analyst reviews the following Arachni scan results for a web application that stores PII data:

CS0-003 Question 91

Which of the following should be remediated first?

Options:
A.

SQL injection

B.

RFI

C.

XSS

D.

Code injection

CompTIA CS0-003 Premium Access
Questions 92

A security analyst is reviewing events that occurred during a possible compromise. The analyst obtains the following log:

CS0-003 Question 92

Which of the following is most likely occurring, based on the events in the log?

Options:
A.

An adversary is attempting to find the shortest path of compromise.

B.

An adversary is performing a vulnerability scan.

C.

An adversary is escalating privileges.

D.

An adversary is performing a password stuffing attack..

Questions 93

Which of the following is the most important factor to ensure accurate incident response reporting?

Options:
A.

A well-defined timeline of the events

B.

A guideline for regulatory reporting

C.

Logs from the impacted system

D.

A well-developed executive summary

Questions 94

Which of the following best describes the key elements of a successful information security program?

Options:
A.

Business impact analysis, asset and change management, and security communication plan

B.

Security policy implementation, assignment of roles and responsibilities, and information asset classification

C.

Disaster recovery and business continuity planning, and the definition of access control requirements and human resource policies

D.

Senior management organizational structure, message distribution standards, and procedures for the operation of security management systems

Questions 95

A security administrator has found indications of dictionary attacks against the company's external-facing portal. Which of the following should be implemented to best mitigate the password attacks?

Options:
A.

Multifactor authentication

B.

Password complexity

C.

Web application firewall

D.

Lockout policy

Questions 96

A SOC analyst determined that a significant number of the reported alarms could be closed after removing the duplicates. Which of the following could help the analyst reduce the number of alarms with the least effort?

Options:
A.

SOAR

B.

API

C.

XDR

D.

REST

Questions 97

Which of the following describes how a CSIRT lead determines who should be communicated with and when during a security incident?

Options:
A.

The lead should review what is documented in the incident response policy or plan

B.

Management level members of the CSIRT should make that decision

C.

The lead has the authority to decide who to communicate with at any time

D.

Subject matter experts on the team should communicate with others within the specified area of expertise

Questions 98

A SOC receives several alerts indicating user accounts are connecting to the company’s identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?

Options:
A.

DNS

B.

tcpdump

C.

Directory

D.

IDS

Questions 99

A cryptocurrency service company is primarily concerned with ensuring the accuracy of the data on one of its systems. A security analyst has been tasked with prioritizing vulnerabilities for remediation for the system. The analyst will use the following CVSSv3.1 impact metrics for prioritization:

CS0-003 Question 99

Which of the following vulnerabilities should be prioritized for remediation?

Options:
A.

1

B.

2

C.

3

D.

4

Questions 100

An employee accessed a website that caused a device to become infected with invasive malware. The incident response analyst has:

• created the initial evidence log.

• disabled the wireless adapter on the device.

• interviewed the employee, who was unable to identify the website that was accessed

• reviewed the web proxy traffic logs.

Which of the following should the analyst do to remediate the infected device?

Options:
A.

Update the system firmware and reimage the hardware.

B.

Install an additional malware scanner that will send email alerts to the analyst.

C.

Configure the system to use a proxy server for Internet access.

D.

Delete the user profile and restore data from backup.