CompTIA CS0-003 Practice Test - Questions Answers, Page 17
List of questions
Related questions
During an incident, analysts need to rapidly investigate by the investigation and leadership teams.
Which of the following best describes how PII should be safeguarded during an incident?
A security analyst is reviewing the logs of a web server and notices that an attacker has attempted to exploit a SQL injection vulnerability. Which of the following tools can the analyst use to analyze the attack and prevent future attacks?
Which Of the following techniques would be best to provide the necessary assurance for embedded software that drives centrifugal pumps at a power Plant?
A security team identified several rogue Wi-Fi access points during the most recent network scan.
The network scans occur once per quarter. Which of the following controls would best all ow the organization to identity rogue devices more quickly?
An analyst needs to provide recommendations based on a recent vulnerability scan:
Which of the following should the analyst recommend addressing to ensure potential vulnerabilities are identified?
A security analyst recently used Arachni to perform a vulnerability assessment of a newly developed web application. The analyst is concerned about the following output:
[+] XSS: In form input 'txtSearch' with action https://localhost/search.aspx
[-] XSS: Analyzing response #1...
[-] XSS: Analyzing response #2...
[-] XSS: Analyzing response #3...
[+] XSS: Response is tainted. Looking for proof of the vulnerability.
Which of the following is the most likely reason for this vulnerability?
A security analyst found the following vulnerability on the company’s website:
<INPUT TYPE=“IMAGE” SRC=“javascript:alert(‘test’);”>
Which of the following should be implemented to prevent this type of attack in the future?
A SIEM alert is triggered based on execution of a suspicious one-liner on two workstations in the organization's environment. An analyst views the details of these events below:
Which of the following statements best describes the intent of the attacker, based on this one-liner?
A security analyst detects an email server that had been compromised in the internal network. Users have been reporting strange messages in their email inboxes and unusual network traffic. Which of the following incident response steps should be performed next?
While reviewing web server logs, a security analyst discovers the following suspicious line:
Which of the following is being attempted?
Question