ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 11

Add to Whishlist

List of questions

Question 101

Report Export Collapse

A company is in the process of implementing a vulnerability management program. no-lich of the following scanning methods should be implemented to minimize the risk of OT/ICS devices malfunctioning due to the vulnerability identification process?

Become a Premium Member for full access
  Unlock Premium Member

Question 102

Report Export Collapse

A security analyst must preserve a system hard drive that was involved in a litigation request Which of the following is the best method to ensure the data on the device is not modified?

Become a Premium Member for full access
  Unlock Premium Member

Question 103

Report Export Collapse

A virtual web server in a server pool was infected with malware after an analyst used the internet to research a system issue. After the server was rebuilt and added back into the server pool, users reported issues with the website, indicating the site could not be trusted. Which of the following is the most likely cause of the server issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 104

Report Export Collapse

A security analyst is reviewing the following alert that was triggered by FIM on a critical system:

CompTIA CS0-003 image Question 104 94725 10022024175105000000

Which of the following best describes the suspicious activity that is occurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 105

Report Export Collapse

A security analyst is trying to detect connections to a suspicious IP address by collecting the packet captures from the gateway. Which of the following commands should the security analyst consider running?

Become a Premium Member for full access
  Unlock Premium Member

Question 106

Report Export Collapse

Given the following CVSS string-

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/3:U/C:K/I:K/A:H

Which of the following attributes correctly describes this vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 107

Report Export Collapse

An incident response team is working with law enforcement to investigate an active web server compromise. The decision has been made to keep the server running and to implement compensating controls for a period of time. The web service must be accessible from the internet via the reverse proxy and must connect to a database server. Which of the following compensating controls will help contain the adversary while meeting the other requirements? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 108

Report Export Collapse

A recent penetration test discovered that several employees were enticed to assist attackers by visiting specific websites and running downloaded files when prompted by phone calls. Which of the following would best address this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 109

Report Export Collapse

Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in a secure environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 110

Report Export Collapse

Which of the following risk management principles is accomplished by purchasing cyber insurance?

Become a Premium Member for full access
  Unlock Premium Member
Total 431 questions
Go to page: of 44
Search

Related questions