ExamGecko
Home Home / CompTIA / CS0-003

CompTIA CS0-003 Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Related questions











A cybersecurity analyst is recording the following details

* ID

* Name

* Description

* Classification of information

* Responsible party

In which of the following documents is the analyst recording this information?

A.
Risk register
A.
Risk register
Answers
B.
Change control documentation
B.
Change control documentation
Answers
C.
Incident response playbook
C.
Incident response playbook
Answers
D.
Incident response plan
D.
Incident response plan
Answers
Suggested answer: A

Explanation:

A risk register typically contains details like ID, name, description, classification of information, and responsible party. It's used for tracking identified risks and managing them. Recording details like ID, Name, Description, Classification of information, and Responsible party is typically done in a Risk Register. This document is used to identify, assess, manage, and monitor risks within an organization. It's not directly related to incident response or change control documentation.

A threat hunter seeks to identify new persistence mechanisms installed in an organization's environment. In collecting scheduled tasks from all enterprise workstations, the following host details are aggregated:

Which of the following actions should the hunter perform first based on the details above?

A.
Acquire a copy of taskhw.exe from the impacted host
A.
Acquire a copy of taskhw.exe from the impacted host
Answers
B.
Scan the enterprise to identify other systems with taskhw.exe present
B.
Scan the enterprise to identify other systems with taskhw.exe present
Answers
C.
Perform a public search for malware reports on taskhw.exe.
C.
Perform a public search for malware reports on taskhw.exe.
Answers
D.
Change the account that runs the -caskhw. exe scheduled task
D.
Change the account that runs the -caskhw. exe scheduled task
Answers
Suggested answer: C

Explanation:

The first step should be to perform a public search for malware reports on taskhw.exe, as this file is suspicious for several reasons: it is located in a non-standard path, it has a high CPU usage, it is signed by an unknown entity, and it is only present on one host. A public search can help to determine if this file is a known malware or a legitimate program. If it is malware, the hunter can then take appropriate actions to remove it and prevent further damage. The other options are either premature or ineffective, as they do not provide enough information to assess the threat level of taskhw.exe.Reference:Cybersecurity Analyst+ - CompTIA,taskhw.exe Windows process - What is it? - file.net,Taskhostw.exe - What Is Taskhostw.exe & Is It Malware? - MalwareTips Forums

A recent vulnerability scan resulted in an abnormally large number of critical and high findings that require patching. The SLA requires that the findings be remediated within a specific amount of time. Which of the following is the best approach to ensure all vulnerabilities are patched in accordance with the SLA?

A.
Integrate an IT service delivery ticketing system to track remediation and closure.
A.
Integrate an IT service delivery ticketing system to track remediation and closure.
Answers
B.
Create a compensating control item until the system can be fully patched.
B.
Create a compensating control item until the system can be fully patched.
Answers
C.
Accept the risk and decommission current assets as end of life.
C.
Accept the risk and decommission current assets as end of life.
Answers
D.
Request an exception and manually patch each system.
D.
Request an exception and manually patch each system.
Answers
Suggested answer: A

Explanation:

Integrating an IT service delivery ticketing system to track remediation and closure is the best approach to ensure all vulnerabilities are patched in accordance with the SLA. A ticketing system is a software tool that helps manage, organize, and track the tasks and workflows related to IT service delivery, such as incident management, problem management, change management, and vulnerability management. A ticketing system can help the security team to prioritize, assign, monitor, and document the remediation of the vulnerabilities, and to ensure that they are completed within the specified time frame and quality standards. A ticketing system can also help the security team to communicate and collaborate with other teams, such as the IT operations team, the development team, and the business stakeholders, and to report on the status and progress of the remediation efforts12. Creating a compensating control item, accepting the risk, and requesting an exception are not the best approaches to ensure all vulnerabilities are patched in accordance with the SLA, as they do not address the root cause of the problem, which is the large number of critical and high findings that require patching. These approaches may also introduce more risks or challenges for the security team, such as compliance issues, resource constraints, or business impacts3 .

Reference: What is a Ticketing System? | Freshservice ITSM Glossary, Vulnerability Management Best Practices, Compensating Controls: An Impermanent Solution to an IT ... - Tripwire, [Risk Acceptance in Information Security - Infosec Resources], [Exception Management - ISACA]

A team of analysts is developing a new internal system that correlates information from a variety of sources analyzes that information, and then triggers notifications according to company policy Which of the following technologies was deployed?

A.
SIEM
A.
SIEM
Answers
B.
SOAR
B.
SOAR
Answers
C.
IPS
C.
IPS
Answers
D.
CERT
D.
CERT
Answers
Suggested answer: A

Explanation:

SIEM (Security Information and Event Management) technology aggregates and analyzes activity from many different resources across your IT infrastructure. The description of correlating information from various sources and triggering notifications aligns with the capabilities of a SIEM system.

A security analyst received an alert regarding multiple successful MFA log-ins for a particular user When reviewing the authentication logs the analyst sees the following:

Which of the following are most likely occurring, based on the MFA logs? (Select two).

A.
Dictionary attack
A.
Dictionary attack
Answers
B.
Push phishing
B.
Push phishing
Answers
C.
impossible geo-velocity
C.
impossible geo-velocity
Answers
D.
Subscriber identity module swapping
D.
Subscriber identity module swapping
Answers
E.
Rogue access point
E.
Rogue access point
Answers
F.
Password spray
F.
Password spray
Answers
Suggested answer: B, C

Explanation:

C) Impossible geo-velocity: This is an event where a single user's account is accessed from different geographical locations within a timeframe that is impossible for normal human travel. In the log, we can see that the user 'jdoe' is accessing from the United States and then within a few minutes from Russia, which is practically impossible to achieve without the use of some form of automated system or if the account credentials are being used by different individuals in different locations.

B) Push phishing: This could also be an indication of push phishing, where the user is tricked into approving a multi-factor authentication request that they did not initiate. This is less clear from the logs directly, but it could be inferred if the user is receiving MFA requests that they are not initiating and are being approved without their genuine desire to access the resources.

An attacker recently gained unauthorized access to a financial institution's database, which contains confidential information. The attacker exfiltrated a large amount of data before being detected and blocked. A security analyst needs to complete a root cause analysis to determine how the attacker was able to gain access. Which of the following should the analyst perform first?

A.
Document the incident and any findings related to the attack for future reference.
A.
Document the incident and any findings related to the attack for future reference.
Answers
B.
Interview employees responsible for managing the affected systems.
B.
Interview employees responsible for managing the affected systems.
Answers
C.
Review the log files that record all events related to client applications and user access.
C.
Review the log files that record all events related to client applications and user access.
Answers
D.
Identify the immediate actions that need to be taken to contain the incident and minimize damage.
D.
Identify the immediate actions that need to be taken to contain the incident and minimize damage.
Answers
Suggested answer: C

Explanation:

In a root cause analysis following unauthorized access, the initial step is usually to review relevant log files. These logs can provide critical information about how and when the attacker gained access.

The first step in a root cause analysis after a data breach is typically to review the logs. This helps the analyst understand how the attacker gained access by providing a detailed record of all events, including unauthorized or abnormal activities. Documenting the incident, interviewing employees, and identifying immediate containment actions are important steps, but they usually follow the initial log review.

A security analyst is responding to an indent that involves a malicious attack on a network. Data closet. Which of the following best explains how are analyst should properly document the incident?

A.
Back up the configuration file for alt network devices
A.
Back up the configuration file for alt network devices
Answers
B.
Record and validate each connection
B.
Record and validate each connection
Answers
C.
Create a full diagram of the network infrastructure
C.
Create a full diagram of the network infrastructure
Answers
D.
Take photos of the impacted items
D.
Take photos of the impacted items
Answers
Suggested answer: D

Explanation:

When documenting a physical incident in a network data closet, taking photos provides a clear and immediate record of the situation, which is essential for thorough incident documentation and subsequent investigation.

Proper documentation of an incident in a data closet should include taking photos of the impacted items. This provides visual evidence and helps in understanding the physical context of the incident, which is crucial for a thorough investigation. Backing up configuration files, recording connections, and creating network diagrams, while important, are not the primary means of documenting the physical aspects of an incident.

While reviewing the web server logs a security analyst notices the following snippet

..\../..\../boot.ini

Which of the following is being attempted?

A.
Directory traversal
A.
Directory traversal
Answers
B.
Remote file inclusion
B.
Remote file inclusion
Answers
C.
Cross-site scripting
C.
Cross-site scripting
Answers
D.
Remote code execution
D.
Remote code execution
Answers
E.
Enumeration of/etc/pasawd
E.
Enumeration of/etc/pasawd
Answers
Suggested answer: A

Explanation:

The log entry '......\boot.ini' is indicative of a directory traversal attack, where an attacker attempts to access files and directories that are stored outside the web root folder.

The log snippet '......\boot.ini' is indicative of a directory traversal attack. This type of attack aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with ''../'' (dot-dot-slash), the attacker may be able to access arbitrary files and directories stored on the file system.

A security analyst observed the following activity from a privileged account:

. Accessing emails and sensitive information

. Audit logs being modified

. Abnormal log-in times

Which of the following best describes the observed activity?

A.
Irregular peer-to-peer communication
A.
Irregular peer-to-peer communication
Answers
B.
Unauthorized privileges
B.
Unauthorized privileges
Answers
C.
Rogue devices on the network
C.
Rogue devices on the network
Answers
D.
Insider attack
D.
Insider attack
Answers
Suggested answer: D

Explanation:

The observed activity from a privileged account indicates an insider attack, which is when a trusted user or employee misuses their access rights to compromise the security of the organization. Accessing emails and sensitive information, modifying audit logs, and logging in at abnormal times are all signs of malicious behavior by a privileged user who may be trying to steal, tamper, or destroy data, or cover their tracks. An insider attack can cause significant damage to the organization's reputation, operations, and compliance12.

Reference: The Privileged Identity Playbook Guides Management of Privileged User Accounts, How to Track Privileged Users' Activities in Active Directory

A penetration tester submitted data to a form in a web application, which enabled the penetration tester to retrieve user credentials. Which of the following should be recommended for remediation of this application vulnerability?

A.
Implementing multifactor authentication on the server OS
A.
Implementing multifactor authentication on the server OS
Answers
B.
Hashing user passwords on the web application
B.
Hashing user passwords on the web application
Answers
C.
Performing input validation before allowing submission
C.
Performing input validation before allowing submission
Answers
D.
Segmenting the network between the users and the web server
D.
Segmenting the network between the users and the web server
Answers
Suggested answer: C

Explanation:

Performing input validation before allowing submission is the best recommendation for remediation of this application vulnerability. Input validation is a technique that checks the data entered by users or attackers against a set of rules or constraints, such as data type, length, format, or range. Input validation can prevent common web application attacks such as SQL injection, cross-site scripting (XSS), or command injection, which exploit the lack of input validation to execute malicious code or commands on the server or the client side. By validating the input before allowing submission, the web application can reject or sanitize any malicious or unexpected input, and protect the user credentials and other sensitive data from being compromised12.

Reference: Input Validation - OWASP, 4 Most Common Application Vulnerabilities and Possible Remediation

Total 368 questions
Go to page: of 37