Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA CS0-003 Practice Exam with Questions & Answers | Set: 4

Questions 31

Which of the following documents sets requirements and metrics for a third-party response during an event?

Options:
A.

BIA

B.

DRP

C.

SLA

D.

MOU

CompTIA CS0-003 Premium Access
Questions 32

While reviewing web server logs, a security analyst discovers the following suspicious line:

CS0-003 Question 32

Which of the following is being attempted?

Options:
A.

Remote file inclusion

B.

Command injection

C.

Server-side request forgery

D.

Reverse shell

Questions 33

A new cybersecurity analyst is tasked with creating an executive briefing on possible threats to the organization. Which of the following will produce the data needed for the briefing?

Options:
A.

Firewall logs

B.

Indicators of compromise

C.

Risk assessment

D.

Access control lists

Questions 34

An incident response team is assessing attack vectors of malware that is encrypting data with ransomware. There are no indications of a network-based intrusion.

Which of the following is the most likely root cause of the incident?

Options:
A.

USB drop

B.

LFI

C.

Cross-site forgery

D.

SQL injection

Questions 35

Which of the following would a security analyst most likely use to compare TTPs between different known adversaries of an organization?

Options:
A.

MITRE ATTACK

B.

Cyber Kill Cham

C.

OWASP

D.

STIXTAXII

Questions 36

Due to an incident involving company devices, an incident responder needs to take a mobile phone to the lab for further investigation. Which of the following tools should be used to maintain the integrity of the mobile phone while it is transported? (Select two).

Options:
A.

Signal-shielded bag

B.

Tamper-evident seal

C.

Thumb drive

D.

Crime scene tape

E.

Write blocker

F.

Drive duplicator

Questions 37

A security analyst scans a host and generates the following output:

CS0-003 Question 37

Which of the following best describes the output?

Options:
A.

The host is unresponsive to the ICMP request.

B.

The host Is running a vulnerable mall server.

C.

The host Is allowlng unsecured FTP connectlons.

D.

The host is vulnerable to web-based exploits.

Questions 38

A security administrator needs to import Pll data records from the production environment to the test environment for testing purposes. Which of the following would best protect data confidentiality?

Options:
A.

Data masking

B.

Hashing

C.

Watermarking

D.

Encoding

Questions 39

A web application team notifies a SOC analyst that there are thousands of HTTP/404 events on the public-facing web server. Which of the following is the next step for the analyst to take?

Options:
A.

Instruct the firewall engineer that a rule needs to be added to block this external server.

B.

Escalate the event to an incident and notify the SOC manager of the activity.

C.

Notify the incident response team that a DDoS attack is occurring.

D.

Identify the IP/hostname for the requests and look at the related activity.

Questions 40

During an incident, some loCs of possible ransomware contamination were found in a group of servers in a segment of the network. Which of the following steps should be taken next?

Options:
A.

Isolation

B.

Remediation

C.

Reimaging

D.

Preservation