ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

A recent zero-day vulnerability is being actively exploited, requires no user interaction or privilege escalation, and has a significant impact to confidentiality and integrity but not to availability. Which of the following CVE metrics would be most accurate for this zero-day threat?

CVSS: 31/AV: N/AC: L/PR: N/UI: N/S: U/C: H/1: K/A: L
CVSS: 31/AV: N/AC: L/PR: N/UI: N/S: U/C: H/1: K/A: L
CVSS:31/AV:K/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
CVSS:31/AV:K/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
CVSS:31/AV:N/AC:L/PR:N/UI:H/S:U/C:L/I:N/A:H
CVSS:31/AV:N/AC:L/PR:N/UI:H/S:U/C:L/I:N/A:H
CVSS:31/AV:L/AC:L/PR:R/UI:R/S:U/C:H/I:L/A:H
CVSS:31/AV:L/AC:L/PR:R/UI:R/S:U/C:H/I:L/A:H
Suggested answer: A
Explanation:

This answer matches the description of the zero-day threat. The attack vector is network (AV:N), the attack complexity is low (AC:L), no privileges are required (PR:N), no user interaction is required (UI:N), the scope is unchanged (S:U), the confidentiality and integrity impacts are high (C:H/I:H), and the availability impact is low (A:L). Official

Reference: https://nvd.nist.gov/vuln-metrics/cvss

asked 02/10/2024
Alejandro Yepez
51 questions

Question 12

Report Export Collapse

Which of the following tools would work best to prevent the exposure of PII outside of an organization?

PAM
PAM
IDS
IDS
PKI
PKI
DLP
DLP
Suggested answer: D
Explanation:

Data loss prevention (DLP) is a tool that can prevent the exposure of PII outside of an organization by monitoring, detecting, and blocking sensitive data in motion, in use, or at rest.

asked 02/10/2024
Mathieu Alingum Nubee
44 questions

Question 13

Report Export Collapse

An organization conducted a web application vulnerability assessment against the corporate website, and the following output was observed:

CompTIA CS0-003 image Question 13 94634 10022024175105000000

Which of the following tuning recommendations should the security analyst share?

Set an HttpOnlvflaq to force communication by HTTPS
Set an HttpOnlvflaq to force communication by HTTPS
Block requests without an X-Frame-Options header
Block requests without an X-Frame-Options header
Configure an Access-Control-Allow-Origin header to authorized domains
Configure an Access-Control-Allow-Origin header to authorized domains
Disable the cross-origin resource sharing header
Disable the cross-origin resource sharing header
Suggested answer: C
Explanation:


asked 02/10/2024
Tony Minjarez
47 questions

Question 14

Report Export Collapse

Which of the following items should be included in a vulnerability scan report? (Choose two.)

Lessons learned
Lessons learned
Service-level agreement
Service-level agreement
Playbook
Playbook
Affected hosts
Affected hosts
Risk score
Risk score
Education plan
Education plan
Suggested answer: D, E
Explanation:

A vulnerability scan report should include information about the affected hosts, such as their IP addresses, hostnames, operating systems, and services. It should also include a risk score for each vulnerability, which indicates the severity and potential impact of the vulnerability on the host and the organization. Official

Reference: https://www.first.org/cvss/

asked 02/10/2024
Paulo Cury
40 questions

Question 15

Report Export Collapse

The Chief Executive Officer of an organization recently heard that exploitation of new attacks in the industry was happening approximately 45 days after a patch was released. Which of the following would best protect this organization?

A mean time to remediate of 30 days
A mean time to remediate of 30 days
A mean time to detect of 45 days
A mean time to detect of 45 days
A mean time to respond of 15 days
A mean time to respond of 15 days
Third-party application testing
Third-party application testing
Suggested answer: A
Explanation:

A mean time to remediate (MTTR) is a metric that measures how long it takes to fix a vulnerability after it is discovered. A MTTR of 30 days would best protect the organization from the new attacks that are exploited 45 days after a patch is released, as it would ensure that the vulnerabilities are fixed before they are exploited

asked 02/10/2024
Andrea Ciovati
43 questions

Question 16

Report Export Collapse

A security analyst recently joined the team and is trying to determine which scripting language is being used in a production script to determine if it is malicious. Given the following script:

CompTIA CS0-003 image Question 16 94637 10022024175105000000

Which of the following scripting languages was used in the script?

PowerShel
PowerShel
Ruby
Ruby
Python
Python
Shell script
Shell script
Suggested answer: A
Explanation:

The script uses PowerShell syntax, such as cmdlets, parameters, variables, and comments. PowerShell is a scripting language that can be used to automate tasks and manage systems.

asked 02/10/2024
Sergio Guerra
48 questions

Question 17

Report Export Collapse

A company's user accounts have been compromised. Users are also reporting that the company's internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS. Which of the following most likely describes the observed activity?

There is an issue with the SSL certificate causinq port 443 to become unavailable for HTTPS access
There is an issue with the SSL certificate causinq port 443 to become unavailable for HTTPS access
An on-path attack is being performed by someone with internal access that forces users into port 80
An on-path attack is being performed by someone with internal access that forces users into port 80
The web server cannot handle an increasing amount of HTTPS requests so it forwards users to port 80
The web server cannot handle an increasing amount of HTTPS requests so it forwards users to port 80
An error was caused by BGP due to new rules applied over the company's internal routers
An error was caused by BGP due to new rules applied over the company's internal routers
Suggested answer: B
Explanation:

An on-path attack is a type of man-in-the-middle attack where an attacker intercepts and modifies network traffic between two parties. In this case, someone with internal access may be performing an on-path attack by forcing users into port 80, which is used for HTTP communication, instead of port 443, which is used for HTTPS communication. This would allow the attacker to compromise the user accounts and access the company's internal portal.

asked 02/10/2024
Kees den Dekker
47 questions

Question 18

Report Export Collapse

A security analyst is tasked with prioritizing vulnerabilities for remediation. The relevant company security policies are shown below:

Security Policy 1006: Vulnerability Management

1- The Company shall use the CVSSv3.1 Base Score Metrics (Exploitability and Impact) to prioritize the remediation of security vulnerabilities.

2- In situations where a choice must be made between confidentiality and availability, the Company shall prioritize confidentiality of data over availability of systems and data.

3- The Company shall prioritize patching of publicly available systems and services over patching of internally available system.

According to the security policy, which of the following vulnerabilities should be the highest priority to patch?

A)

CompTIA CS0-003 image Question 18 94639 10022024175105000000

B)

CompTIA CS0-003 image Question 18 94639 10022024175105000000

C)

CompTIA CS0-003 image Question 18 94639 10022024175105000000

D)

CompTIA CS0-003 image Question 18 94639 10022024175105000000

Option A
Option A
Option B
Option B
Option C
Option C
Option D
Option D
Suggested answer: C
Explanation:

According to the security policy, the company shall use the CVSSv3.1 Base Score Metrics to prioritize the remediation of security vulnerabilities. Option C has the highest CVSSv3.1 Base Score of 9.8, which indicates a critical severity level. The company shall also prioritize confidentiality of data over availability of systems and data, and option C has a high impact on confidentiality (C:H). Finally, the company shall prioritize patching of publicly available systems and services over patching of internally available systems, and option C affects a public-facing web server. Official

Reference: https://www.first.org/cvss/

asked 02/10/2024
Elena Albu
43 questions

Question 19

Report Export Collapse

Which of the following will most likely ensure that mission-critical services are available in the event of an incident?

Business continuity plan
Business continuity plan
Vulnerability management plan
Vulnerability management plan
Disaster recovery plan
Disaster recovery plan
Asset management plan
Asset management plan
Suggested answer: C
asked 02/10/2024
Aldrin Plata
45 questions

Question 20

Report Export Collapse

The Chief Information Security Officer wants to eliminate and reduce shadow IT in the enterprise. Several high-risk cloud applications are used that increase the risk to the organization. Which of the following solutions will assist in reducing the risk?

Deploy a CASB and enable policy enforcement
Deploy a CASB and enable policy enforcement
Configure MFA with strict access
Configure MFA with strict access
Deploy an API gateway
Deploy an API gateway
Enable SSO to the cloud applications
Enable SSO to the cloud applications
Suggested answer: A
Explanation:

A cloud access security broker (CASB) is a tool that can help reduce the risk of shadow IT in the enterprise by providing visibility and control over cloud applications and services. A CASB can enable policy enforcement by blocking unauthorized or risky cloud applications, enforcing data loss prevention rules, encrypting sensitive data, and detecting anomalous user behavior.

asked 02/10/2024
James Joiner
36 questions
Total 431 questions
Go to page: of 44
Search

Related questions