ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 26

Add to Whishlist

List of questions

Question 251

Report Export Collapse

A security team is concerned about recent Layer 4 DDoS attacks against the company website. Which of the following controls would best mitigate the attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 252

Report Export Collapse

Which of the following is a useful tool for mapping, tracking, and mitigating identified threats and vulnerabilities with the likelihood and impact of occurrence?

Become a Premium Member for full access
  Unlock Premium Member

Question 253

Report Export Collapse

A security analyst has found a moderate-risk item in an organization's point-of-sale application. The organization is currently in a change freeze window and has decided that the risk is not high enough to correct at this time. Which of the following inhibitors to remediation does this scenario illustrate?

Become a Premium Member for full access
  Unlock Premium Member

Question 254

Report Export Collapse

A company has a primary control in place to restrict access to a sensitive database. However, the company discovered an authentication vulnerability that could bypass this control. Which of the following is the best compensating control?

Become a Premium Member for full access
  Unlock Premium Member

Question 255

Report Export Collapse

A company is concerned with finding sensitive file storage locations that are open to the public. The current internal cloud network is flat. Which of the following is the best solution to secure the network?

Become a Premium Member for full access
  Unlock Premium Member

Question 256

Report Export Collapse

A security analyst reviews the following Arachni scan results for a web application that stores PII data:

CompTIA CS0-003 image Question 256 94877 10022024175105000000

Which of the following should be remediated first?

Become a Premium Member for full access
  Unlock Premium Member

Question 257

Report Export Collapse

A systems administrator receives reports of an internet-accessible Linux server that is running very sluggishly. The administrator examines the server, sees a high amount of memory utilization, and suspects a DoS attack related to half-open TCP sessions consuming memory. Which of the following tools would best help to prove whether this server was experiencing this behavior?

Become a Premium Member for full access
  Unlock Premium Member

Question 258

Report Export Collapse

A systems administrator notices unfamiliar directory names on a production server. The administrator reviews the directory listings and files, and then concludes the server has been

compromised. Which of the following steps should the administrator take next?

Become a Premium Member for full access
  Unlock Premium Member

Question 259

Report Export Collapse

An organization is conducting a pilot deployment of an e-commerce application. The application's source code is not available. Which of the following strategies should an analyst recommend to evaluate the security of the software?

Become a Premium Member for full access
  Unlock Premium Member

Question 260

Report Export Collapse

An analyst is designing a message system for a bank. The analyst wants to include a feature that allows the recipient of a message to prove to a third party that the message came from the sender Which of the following information security goals is the analyst most likely trying to achieve?

Become a Premium Member for full access
  Unlock Premium Member
Total 437 questions
Go to page: of 44
Search

Related questions