ExamGecko
Home Home / CompTIA / CS0-003

CompTIA CS0-003 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











During an incident, analysts need to rapidly investigate by the investigation and leadership teams.

Which of the following best describes how PII should be safeguarded during an incident?

A.
Implement data encryption and close the data so only the company has access.
A.
Implement data encryption and close the data so only the company has access.
Answers
B.
Ensure permissions are limited in the investigation team and encrypt the data.
B.
Ensure permissions are limited in the investigation team and encrypt the data.
Answers
C.
Implement data encryption and create a standardized procedure for deleting data that is no longer needed.
C.
Implement data encryption and create a standardized procedure for deleting data that is no longer needed.
Answers
D.
Ensure that permissions are open only to the company.
D.
Ensure that permissions are open only to the company.
Answers
Suggested answer: B

Explanation:

The best option to safeguard PII during an incident is to ensure permissions are limited in the investigation team and encrypt the data. This is because limiting permissions reduces the risk of unauthorized access or leakage of sensitive data, and encryption protects the data from being read or modified by anyone who does not have the decryption key. Option A is not correct because closing the data may hinder the investigation process and prevent collaboration with other parties who may need access to the data. Option C is not correct because deleting data that is no longer needed may violate legal or regulatory requirements for data retention, and may also destroy potential evidence for the incident. Option D is not correct because opening permissions to the company may expose the data to more people than necessary, increasing the risk of compromise or misuse.

Reference: CompTIA CySA+ Study Guide: Exam CS0-002, 2nd Edition, Chapter 4, “Data Protection and Privacy Practices”, page 195; CompTIA CySA+ Certification Exam Objectives Version 4.0, Domain 4.0

“Compliance and Assessment”, Objective 4.1 “Given a scenario, analyze data as part of a security incident”, Sub-objective “Data encryption”, page 23

: CompTIA CySA+ Study Guide: Exam CS0-002, 2nd Edition : CompTIA CySA+ Certification Exam Objectives Version 4.0.pdf)

A security analyst is reviewing the logs of a web server and notices that an attacker has attempted to exploit a SQL injection vulnerability. Which of the following tools can the analyst use to analyze the attack and prevent future attacks?

A.
A web application firewall
A.
A web application firewall
Answers
B.
A network intrusion detection system
B.
A network intrusion detection system
Answers
C.
A vulnerability scanner
C.
A vulnerability scanner
Answers
D.
A web proxy
D.
A web proxy
Answers
Suggested answer: A

Explanation:

A web application firewall (WAF) is a tool that can protect web servers from attacks such as SQL injection, cross-site scripting, and other web-based threats. A WAF can filter, monitor, and block malicious HTTP traffic before it reaches the web server. A WAF can also be configured with rules and policies to detect and prevent specific types of attacks.

Reference: CompTIA CySA+ Study Guide: Exam CS0-002, 2nd Edition, Chapter 3, “Security

Architecture and Tool Sets”, page 91; CompTIA CySA+ Certification Exam Objectives Version 4.0,

Domain 1.0 “Threat and Vulnerability Management”, Objective 1.2 “Given a scenario, analyze the

results of a network reconnaissance”, Sub-objective “Web application attacks”, page 9

: CompTIA CySA+ Study Guide: Exam CS0-002, 2nd Edition : CompTIA CySA+ Certification Exam Objectives Version 4.0.pdf)

Which Of the following techniques would be best to provide the necessary assurance for embedded software that drives centrifugal pumps at a power Plant?

A.
Containerization
A.
Containerization
Answers
B.
Manual code reviews
B.
Manual code reviews
Answers
C.
Static and dynamic analysis
C.
Static and dynamic analysis
Answers
D.
Formal methods
D.
Formal methods
Answers
Suggested answer: D

Explanation:

According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, the best technique to provide the necessary assurance for embedded software that drives centrifugal pumps at a power plant is formal methods. Formal methods are a rigorous and mathematical approach to software development and verification, which can ensure the correctness and reliability of critical software systems. Formal methods can be used to specify, design, implement, and verify embedded software using formal languages, logics, and tools1.

Containerization, manual code reviews, and static and dynamic analysis are also useful techniques for software assurance, but they are not as rigorous or comprehensive as formal methods.

Containerization is a method of isolating and packaging software applications with their dependencies, which can improve security, portability, and scalability. Manual code reviews are a process of examining the source code of a software program by human reviewers, which can help identify errors, vulnerabilities, and compliance issues. Static and dynamic analysis are techniques of testing and evaluating software without executing it (static) or while executing it (dynamic), which can help detect bugs, defects, and performance issues1.

A security team identified several rogue Wi-Fi access points during the most recent network scan.

The network scans occur once per quarter. Which of the following controls would best all ow the organization to identity rogue devices more quickly?

A.
Implement a continuous monitoring policy.
A.
Implement a continuous monitoring policy.
Answers
B.
Implement a BYOD policy.
B.
Implement a BYOD policy.
Answers
C.
Implement a portable wireless scanning policy.
C.
Implement a portable wireless scanning policy.
Answers
D.
Change the frequency of network scans to once per month.
D.
Change the frequency of network scans to once per month.
Answers
Suggested answer: A

Explanation:

The best control to allow the organization to identify rogue devices more quickly is A. Implement a continuous monitoring policy. A continuous monitoring policy is a set of procedures and tools that enable an organization to detect and respond to unauthorized or anomalous activities on its network in real time or near real time. A continuous monitoring policy can help identify rogue access points as soon as they appear on the network, rather than waiting for quarterly or monthly scans. A continuous monitoring policy can also help improve the overall security posture and compliance of the organization by providing timely and accurate information about its network assets, vulnerabilities, threats, and incidents1.

An analyst needs to provide recommendations based on a recent vulnerability scan:

Which of the following should the analyst recommend addressing to ensure potential vulnerabilities are identified?

A.
SMB use domain SID to enumerate users
A.
SMB use domain SID to enumerate users
Answers
B.
SYN scanner
B.
SYN scanner
Answers
C.
SSL certificate cannot be trusted
C.
SSL certificate cannot be trusted
Answers
D.
Scan not performed with admin privileges
D.
Scan not performed with admin privileges
Answers
Suggested answer: D

Explanation:

This is because scanning without admin privileges can limit the scope and accuracy of the vulnerability scan, and potentially miss some critical vulnerabilities that require higher privileges to detect. According to the OWASP Vulnerability Management Guide1, “scanning without administrative privileges will result in a large number of false negatives and an incomplete scan”.

Therefore, the analyst should recommend addressing this issue to ensure potential vulnerabilities are identified.

A security analyst recently used Arachni to perform a vulnerability assessment of a newly developed web application. The analyst is concerned about the following output:

[+] XSS: In form input 'txtSearch' with action https://localhost/search.aspx

[-] XSS: Analyzing response #1...

[-] XSS: Analyzing response #2...

[-] XSS: Analyzing response #3...

[+] XSS: Response is tainted. Looking for proof of the vulnerability.

Which of the following is the most likely reason for this vulnerability?

A.
The developer set input validation protection on the specific field of search.aspx.
A.
The developer set input validation protection on the specific field of search.aspx.
Answers
B.
The developer did not set proper cross-site scripting protections in the header.
B.
The developer did not set proper cross-site scripting protections in the header.
Answers
C.
The developer did not implement default protections in the web application build.
C.
The developer did not implement default protections in the web application build.
Answers
D.
The developer did not set proper cross-site request forgery protections.
D.
The developer did not set proper cross-site request forgery protections.
Answers
Suggested answer: B

Explanation:

The most likely reason for this vulnerability is B. The developer did not set proper cross-site scripting protections in the header. Cross-site scripting (XSS) is a type of web application vulnerability that allows an attacker to inject malicious code into a web page that is viewed by other users. XSS can be used to steal cookies, session tokens, credentials, or other sensitive information, or to perform actions on behalf of the victim1.

One of the common ways to prevent XSS attacks is to set proper HTTP response headers that instruct the browser how to handle the content of the web page. For example, the Content-Type header can specify the MIME type and character encoding of the web page, which can help the browser avoid interpreting data as code. The X-XSS-Protection header can enable or disable the browser’s built-in XSS filter, which can block or sanitize suspicious scripts. The Content-Security-Policy header can define a whitelist of sources and directives that control what resources and scripts can be loaded or executed on the web page2.

According to the output of Arachni, a web application security scanner framework3, it detected an XSS vulnerability in the form input ‘txtSearch’ with action https://localhost/search.aspx. This means that Arachni was able to inject a malicious script into the input field and observe its execution in the response. This indicates that the developer did not set proper cross-site scripting protections in the header of search.aspx, which allowed Arachni to bypass the browser’s default security mechanisms and execute arbitrary code on the web page.

A security analyst found the following vulnerability on the company’s website:

<INPUT TYPE=“IMAGE” SRC=“javascript:alert(‘test’);”>

Which of the following should be implemented to prevent this type of attack in the future?

A.
Input sanitization
A.
Input sanitization
Answers
B.
Output encoding
B.
Output encoding
Answers
C.
Code obfuscation
C.
Code obfuscation
Answers
D.
Prepared statements
D.
Prepared statements
Answers
Suggested answer: A

Explanation:

This is a type of web application vulnerability called cross-site scripting (XSS), which allows an attacker to inject malicious code into a web page that is viewed by other users. XSS can be used to steal cookies, session tokens, credentials, or other sensitive information, or to perform actions on behalf of the victim.

Input sanitization is a technique that prevents XSS attacks by checking and filtering the user input before processing it. Input sanitization can remove or encode any characters or strings that may be interpreted as code by the browser, such as <, >, ", ', or javascript:. Input sanitization can also validate the input against a predefined format or range of values, and reject any input that does not match. Output encoding is a technique that prevents XSS attacks by encoding the output before sending it to the browser. Output encoding can convert any characters or strings that may be interpreted as code by the browser into harmless entities, such as <, >, ", ', or javascript:. Output encoding can also

escape any special characters that may have a different meaning in different contexts, such as , /, or ;.

Code obfuscation is a technique that makes the source code of a web application more difficult to read and understand by humans. Code obfuscation can use techniques such as renaming variables and functions, removing comments and whitespace, replacing literals with expressions, or adding dummy code. Code obfuscation can help protect the intellectual property and trade secrets of a web application, but it does not prevent XSS attacks.

A SIEM alert is triggered based on execution of a suspicious one-liner on two workstations in the organization's environment. An analyst views the details of these events below:

Which of the following statements best describes the intent of the attacker, based on this one-liner?

A.
Attacker is escalating privileges via JavaScript.
A.
Attacker is escalating privileges via JavaScript.
Answers
B.
Attacker is utilizing custom malware to download an additional script.
B.
Attacker is utilizing custom malware to download an additional script.
Answers
C.
Attacker is executing PowerShell script 'AccessToken.psr.
C.
Attacker is executing PowerShell script 'AccessToken.psr.
Answers
D.
Attacker is attempting to install persistence mechanisms on the target machine.
D.
Attacker is attempting to install persistence mechanisms on the target machine.
Answers
Suggested answer: B

Explanation:

The one-liner script is utilizing JavaScript to execute a PowerShell command that downloads and runs a script from an external source, indicating the use of custom malware to download an additional script.Reference:CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition, Chapter 4: Security Operations and Monitoring, page 156.

A security analyst detects an email server that had been compromised in the internal network. Users have been reporting strange messages in their email inboxes and unusual network traffic. Which of the following incident response steps should be performed next?

A.
Preparation
A.
Preparation
Answers
B.
Validation
B.
Validation
Answers
C.
Containment
C.
Containment
Answers
D.
Eradication
D.
Eradication
Answers
Suggested answer: C

Explanation:

After detecting a compromised email server and unusual network traffic, the next step in incident response is containment, to prevent further damage or spread of the compromise.Reference:CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition, Chapter 5: Incident Response, page 197.

While reviewing web server logs, a security analyst discovers the following suspicious line:

Which of the following is being attempted?

A.
Remote file inclusion
A.
Remote file inclusion
Answers
B.
Command injection
B.
Command injection
Answers
C.
Server-side request forgery
C.
Server-side request forgery
Answers
D.
Reverse shell
D.
Reverse shell
Answers
Suggested answer: B

Explanation:

The suspicious line in the web server logs is an attempt to execute a command on the server, indicating a command injection attack.

Reference:CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition, Chapter 5, page 197;CompTIA CySA+ CS0-003 Certification Study Guide, Chapter 5, page 205.

Total 368 questions
Go to page: of 37