CompTIA CS0-003 Practice Test - Questions Answers, Page 17

List of questions
Question 161

During an incident, analysts need to rapidly investigate by the investigation and leadership teams.
Which of the following best describes how PII should be safeguarded during an incident?
Question 162

A security analyst is reviewing the logs of a web server and notices that an attacker has attempted to exploit a SQL injection vulnerability. Which of the following tools can the analyst use to analyze the attack and prevent future attacks?
Question 163

Which Of the following techniques would be best to provide the necessary assurance for embedded software that drives centrifugal pumps at a power Plant?
Question 164

A security team identified several rogue Wi-Fi access points during the most recent network scan.
The network scans occur once per quarter. Which of the following controls would best all ow the organization to identity rogue devices more quickly?
Question 165

An analyst needs to provide recommendations based on a recent vulnerability scan:
Which of the following should the analyst recommend addressing to ensure potential vulnerabilities are identified?
Question 166

A security analyst recently used Arachni to perform a vulnerability assessment of a newly developed web application. The analyst is concerned about the following output:
[+] XSS: In form input 'txtSearch' with action https://localhost/search.aspx
[-] XSS: Analyzing response #1...
[-] XSS: Analyzing response #2...
[-] XSS: Analyzing response #3...
[+] XSS: Response is tainted. Looking for proof of the vulnerability.
Which of the following is the most likely reason for this vulnerability?
Question 167

A security analyst found the following vulnerability on the companyβs website:
<INPUT TYPE=βIMAGEβ SRC=βjavascript:alert(βtestβ);β>
Which of the following should be implemented to prevent this type of attack in the future?
Question 168

A SIEM alert is triggered based on execution of a suspicious one-liner on two workstations in the organization's environment. An analyst views the details of these events below:
Which of the following statements best describes the intent of the attacker, based on this one-liner?
Question 169

A security analyst detects an email server that had been compromised in the internal network. Users have been reporting strange messages in their email inboxes and unusual network traffic. Which of the following incident response steps should be performed next?
Question 170

While reviewing web server logs, a security analyst discovers the following suspicious line:
Which of the following is being attempted?
Question