ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

Which of the following best describes the document that defines the expectation to network customers that patching will only occur between 2:00 a.m. and 4:00 a.m.?

Become a Premium Member for full access
  Unlock Premium Member

Question 92

Report Export Collapse

Which of the following describes the best reason for conducting a root cause analysis?

Become a Premium Member for full access
  Unlock Premium Member

Question 93

Report Export Collapse

An analyst recommends that an EDR agent collect the source IP address, make a connection to the firewall, and create a policy to block the malicious source IP address across the entire network automatically. Which of the following is the best option to help the analyst implement this recommendation?

Become a Premium Member for full access
  Unlock Premium Member

Question 94

Report Export Collapse

An attacker has just gained access to the syslog server on a LAN. Reviewing the syslog entries has allowed the attacker to prioritize possible next targets. Which of the following is this an example of?

Become a Premium Member for full access
  Unlock Premium Member

Question 95

Report Export Collapse

Which of the following concepts is using an API to insert bulk access requests from a file into an identity management system an example of?

Become a Premium Member for full access
  Unlock Premium Member

Question 96

Report Export Collapse

After a security assessment was done by a third-party consulting firm, the cybersecurity program recommended integrating DLP and CASB to reduce analyst alert fatigue. Which of the following is the best possible outcome that this effort hopes to achieve?

Become a Premium Member for full access
  Unlock Premium Member

Question 97

Report Export Collapse

An employee accessed a website that caused a device to become infected with invasive malware. The incident response analyst has:

* created the initial evidence log.

* disabled the wireless adapter on the device.

* interviewed the employee, who was unable to identify the website that was accessed

* reviewed the web proxy traffic logs.

Which of the following should the analyst do to remediate the infected device?

Become a Premium Member for full access
  Unlock Premium Member

Question 98

Report Export Collapse

A SOC analyst recommends adding a layer of defense for all endpoints that will better protect against external threats regardless of the device's operating system. Which of the following best meets this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 99

Report Export Collapse

A security analyst has found the following suspicious DNS traffic while analyzing a packet capture:

* DNS traffic while a tunneling session is active.

* The mean time between queries is less than one second.

* The average query length exceeds 100 characters.

Which of the following attacks most likely occurred?

Become a Premium Member for full access
  Unlock Premium Member

Question 100

Report Export Collapse

A managed security service provider is having difficulty retaining talent due to an increasing workload caused by a client doubling the number of devices connected to the network. Which of the following would best aid in decreasing the workload without increasing staff?

Become a Premium Member for full access
  Unlock Premium Member
Total 437 questions
Go to page: of 44
Search

Related questions