ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 24

Add to Whishlist

List of questions

Question 231

Report Export Collapse

A cybersecurity analyst is recording the following details

* ID

* Name

* Description

* Classification of information

* Responsible party

In which of the following documents is the analyst recording this information?

Become a Premium Member for full access
  Unlock Premium Member

Question 232

Report Export Collapse

A threat hunter seeks to identify new persistence mechanisms installed in an organization's environment. In collecting scheduled tasks from all enterprise workstations, the following host details are aggregated:

CompTIA CS0-003 image Question 232 94853 10022024175105000000

Which of the following actions should the hunter perform first based on the details above?

Become a Premium Member for full access
  Unlock Premium Member

Question 233

Report Export Collapse

A recent vulnerability scan resulted in an abnormally large number of critical and high findings that require patching. The SLA requires that the findings be remediated within a specific amount of time. Which of the following is the best approach to ensure all vulnerabilities are patched in accordance with the SLA?

Become a Premium Member for full access
  Unlock Premium Member

Question 234

Report Export Collapse

A team of analysts is developing a new internal system that correlates information from a variety of sources analyzes that information, and then triggers notifications according to company policy Which of the following technologies was deployed?

Become a Premium Member for full access
  Unlock Premium Member

Question 235

Report Export Collapse

A security analyst received an alert regarding multiple successful MFA log-ins for a particular user When reviewing the authentication logs the analyst sees the following:

CompTIA CS0-003 image Question 235 94856 10022024175105000000

Which of the following are most likely occurring, based on the MFA logs? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 236

Report Export Collapse

An attacker recently gained unauthorized access to a financial institution's database, which contains confidential information. The attacker exfiltrated a large amount of data before being detected and blocked. A security analyst needs to complete a root cause analysis to determine how the attacker was able to gain access. Which of the following should the analyst perform first?

Become a Premium Member for full access
  Unlock Premium Member

Question 237

Report Export Collapse

A security analyst is responding to an indent that involves a malicious attack on a network. Data closet. Which of the following best explains how are analyst should properly document the incident?

Become a Premium Member for full access
  Unlock Premium Member

Question 238

Report Export Collapse

While reviewing the web server logs a security analyst notices the following snippet

..\../..\../boot.ini

Which of the following is being attempted?

Become a Premium Member for full access
  Unlock Premium Member

Question 239

Report Export Collapse

A security analyst observed the following activity from a privileged account:

. Accessing emails and sensitive information

. Audit logs being modified

. Abnormal log-in times

Which of the following best describes the observed activity?

Become a Premium Member for full access
  Unlock Premium Member

Question 240

Report Export Collapse

A penetration tester submitted data to a form in a web application, which enabled the penetration tester to retrieve user credentials. Which of the following should be recommended for remediation of this application vulnerability?

Become a Premium Member for full access
  Unlock Premium Member
Total 431 questions
Go to page: of 44
Search

Related questions