ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 29

Add to Whishlist

List of questions

Question 281

Report Export Collapse

An organization's email account was compromised by a bad actor. Given the following Information:

CompTIA CS0-003 image Question 281 94902 10022024175105000000

Which of the following is the length of time the team took to detect the threat?

Become a Premium Member for full access
  Unlock Premium Member

Question 282

Report Export Collapse

A laptop that is company owned and managed is suspected to have malware. The company implemented centralized security logging. Which of the following log sources will confirm the malware infection?

Become a Premium Member for full access
  Unlock Premium Member

Question 283

Report Export Collapse

During a scan of a web server in the perimeter network, a vulnerability was identified that could be exploited over port 3389. The web server is protected by a WAF. Which of the following best represents the change to overall risk associated with this vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 284

Report Export Collapse

Several vulnerability scan reports have indicated runtime errors as the code is executing. The dashboard that lists the errors has a command-line interface for developers to check for vulnerabilities. Which of the following will enable a developer to correct this issue? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 285

Report Export Collapse

During normal security monitoring activities, the following activity was observed:

cd C:\Users\Documents\HR\Employees

takeown/f .*

SUCCESS:

Which of the following best describes the potentially malicious activity observed?

Become a Premium Member for full access
  Unlock Premium Member

Question 286

Report Export Collapse

An organization has established a formal change management process after experiencing several critical system failures over the past year. Which of the following are key factors that the change management process will include in order to reduce the impact of system failures? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 287

Report Export Collapse

An analyst reviews a recent government alert on new zero-day threats and finds the following CVE metrics for the most critical of the vulnerabilities:

CVSS: 3.1/AV:N/AC: L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:W/RC:R

Which of the following represents the exploit code maturity of this critical vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 288

Report Export Collapse

An organization's threat intelligence team notes a recent trend in adversary privilege escalation procedures. Multiple threat groups have been observed utilizing native Windows tools to bypass system controls and execute commands with privileged credentials. Which of the following controls would be most effective to reduce the rate of success of such attempts?

Become a Premium Member for full access
  Unlock Premium Member

Question 289

Report Export Collapse

Which of the following is a commonly used four-component framework to communicate threat actor behavior?

Become a Premium Member for full access
  Unlock Premium Member

Question 290

Report Export Collapse

An incident response analyst is taking over an investigation from another analyst. The investigation has been going on for the past few days. Which of the following steps is most important during the transition between the two analysts?

Become a Premium Member for full access
  Unlock Premium Member
Total 431 questions
Go to page: of 44
Search

Related questions