ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

An incident response team receives an alert to start an investigation of an internet outage. The outage is preventing all users in multiple locations from accessing external SaaS resources. The team determines the organization was impacted by a DDoS attack. Which of the following logs should the team review first?

CDN
CDN
Vulnerability scanner
Vulnerability scanner
DNS
DNS
Web server
Web server
Suggested answer: C
Explanation:

A distributed denial-of-service (DDoS) attack is a type of cyberattack that aims to overwhelm a target's network or server with a large volume of traffic from multiple sources. A common technique for launching a DDoS attack is to compromise DNS servers, which are responsible for resolving domain names into IP addresses. By flooding DNS servers with malicious requests, attackers can disrupt the normal functioning of the internet and prevent users from accessing external SaaS resources. Official

Reference: https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/cyber-kill-chain-seven-steps-cyberattack/

asked 02/10/2024
Veronica Puddu
57 questions

Question 22

Report Export Collapse

A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attack. Which of the following best describes the current stage of the Cyber Kill Chain that the threat actor is currently operating in?

Weaponization
Weaponization
Reconnaissance
Reconnaissance
Delivery
Delivery
Exploitation
Exploitation
Suggested answer: D
Explanation:

The Cyber Kill Chain is a framework that describes the stages of a cyberattack from reconnaissance to actions on objectives. The exploitation stage is where attackers take advantage of the vulnerabilities they have discovered in previous stages to further infiltrate a target's network and achieve their objectives. In this case, the malicious actor has gained access to an internal network by means of social engineering and does not want to lose access in order to continue the attack. This indicates that the actor is in the exploitation stage of the Cyber Kill Chain. Official

Reference: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html

asked 02/10/2024
Harri rrapaj
34 questions

Question 23

Report Export Collapse

An analyst finds that an IP address outside of the company network that is being used to run network and vulnerability scans across external-facing assets. Which of the following steps of an attack framework is the analyst witnessing?

Exploitation
Exploitation
Reconnaissance
Reconnaissance
Command and control
Command and control
Actions on objectives
Actions on objectives
Suggested answer: B
Explanation:

Reconnaissance is the first stage in the Cyber Kill Chain and involves researching potential targets before carrying out any penetration testing. The reconnaissance stage may include identifying potential targets, finding their vulnerabilities, discovering which third parties are connected to them (and what data they can access), and exploring existing entry points as well as finding new ones. Reconnaissance can take place both online and offline. In this case, an analyst finds that an IP address outside of the company network is being used to run network and vulnerability scans across external-facing assets. This indicates that the analyst is witnessing reconnaissance activity by an attacker. Official

Reference: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html

asked 02/10/2024
Dereque Datson
49 questions

Question 24

Report Export Collapse

An incident response analyst notices multiple emails traversing the network that target only the administrators of the company. The email contains a concealed URL that leads to an unknown website in another country. Which of the following best describes what is happening? (Choose two.)

Beaconinq
Beaconinq
Domain Name System hijacking
Domain Name System hijacking
Social engineering attack
Social engineering attack
On-path attack
On-path attack
Obfuscated links
Obfuscated links
Address Resolution Protocol poisoning
Address Resolution Protocol poisoning
Suggested answer: C, E
Explanation:

A social engineering attack is a type of cyberattack that relies on manipulating human psychology rather than exploiting technical vulnerabilities. A social engineering attack may involve deceiving, persuading, or coercing users into performing actions that benefit the attacker, such as clicking on malicious links, divulging sensitive information, or granting access to restricted resources. An obfuscated link is a link that has been disguised or altered to hide its true destination or purpose. Obfuscated links are often used by attackers to trick users into visiting malicious websites or downloading malware. In this case, an incident response analyst notices multiple emails traversing the network that target only the administrators of the company. The email contains a concealed URL that leads to an unknown website in another country. This indicates that the analyst is witnessing a social engineering attack using obfuscated links.

asked 02/10/2024
Khang Nguyen An
35 questions

Question 25

Report Export Collapse

During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?

Conduct regular red team exercises over the application in production
Conduct regular red team exercises over the application in production
Ensure that all implemented coding libraries are regularly checked
Ensure that all implemented coding libraries are regularly checked
Use application security scanning as part of the pipeline for the CI/CDflow
Use application security scanning as part of the pipeline for the CI/CDflow
Implement proper input validation for any data entry form
Implement proper input validation for any data entry form
Suggested answer: C
Explanation:

Application security scanning is a process that involves testing and analyzing applications for security vulnerabilities, such as injection flaws, broken authentication, cross-site scripting, and insecure configuration. Application security scanning can help identify and fix security issues before they become exploitable by attackers. Using application security scanning as part of the pipeline for the continuous integration/continuous delivery (CI/CD) flow can help mitigate the problem of finding the same vulnerabilities in a critical application during security scanning. This is because application security scanning can be integrated into the development lifecycle and performed automatically and frequently as part of the CI/CD process.

asked 02/10/2024
Vipul Ishan
44 questions

Question 26

Report Export Collapse

An analyst is reviewing a vulnerability report and must make recommendations to the executive team. The analyst finds that most systems can be upgraded with a reboot resulting in a single downtime window. However, two of the critical systems cannot be upgraded due to a vendor appliance that the company does not have access to. Which of the following inhibitors to remediation do these systems and associated vulnerabilities best represent?

Proprietary systems
Proprietary systems
Legacy systems
Legacy systems
Unsupported operating systems
Unsupported operating systems
Lack of maintenance windows
Lack of maintenance windows
Suggested answer: A
Explanation:

Proprietary systems are systems that are owned and controlled by a specific vendor or manufacturer, and that use proprietary standards or protocols that are not compatible with other systems. Proprietary systems can pose a challenge for vulnerability management, as they may not allow users to access or modify their configuration, update their software, or patch their vulnerabilities. In this case, two of the critical systems cannot be upgraded due to a vendor appliance that the company does not have access to. This indicates that these systems and associated vulnerabilities are examples of proprietary systems as inhibitors to remediation

asked 02/10/2024
benakli rabah
29 questions

Question 27

Report Export Collapse

The security team reviews a web server for XSS and runs the following Nmap scan:

CompTIA CS0-003 image Question 27 94648 10022024175105000000

Which of the following most accurately describes the result of the scan?

An output of characters > and ' as the parameters used m the attempt
An output of characters > and ' as the parameters used m the attempt
The vulnerable parameter ID hccp://l72.31.15.2/1.php?id-2 and unfiltered characters returned
The vulnerable parameter ID hccp://l72.31.15.2/1.php?id-2 and unfiltered characters returned
The vulnerable parameter and unfiltered or encoded characters passed > and ' as unsafe
The vulnerable parameter and unfiltered or encoded characters passed > and ' as unsafe
The vulnerable parameter and characters > and ' with a reflected XSS attempt
The vulnerable parameter and characters > and ' with a reflected XSS attempt
Suggested answer: D
Explanation:

A cross-site scripting (XSS) attack is a type of web application attack that injects malicious code into a web page that is then executed by the browser of a victim user. A reflected XSS attack is a type of XSS attack where the malicious code is embedded in a URL or a form parameter that is sent to the web server and then reflected back to the user's browser. In this case, the Nmap scan shows that the web server is vulnerable to a reflected XSS attack, as it returns the characters > and ' without any filtering or encoding. The vulnerable parameter is id in the URL http://172.31.15.2/1.php?id=2.

asked 02/10/2024
Mark Chow
50 questions

Question 28

Report Export Collapse

A security analyst is trying to identify possible network addresses from different source networks belonging to the same company and region. Which of the following shell script functions could help achieve the goal?

function w() { a=$(ping -c 1 $1 | awk-F ''/'' 'END{print $1}') && echo ''$1 | $a'' }
function w() { a=$(ping -c 1 $1 | awk-F ''/'' 'END{print $1}') && echo ''$1 | $a'' }
function x() { b=traceroute -m 40 $1 | awk 'END{print $1}') && echo ''$1 | $b'' }
function x() { b=traceroute -m 40 $1 | awk 'END{print $1}') && echo ''$1 | $b'' }
function y() { dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F ''.in-addr'' '{print $1}').origin.asn.cymru.com TXT +short }
function y() { dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F ''.in-addr'' '{print $1}').origin.asn.cymru.com TXT +short }
function z() { c=$(geoiplookup$1) && echo ''$1 | $c'' }
function z() { c=$(geoiplookup$1) && echo ''$1 | $c'' }
Suggested answer: C
Explanation:

The shell script function that could help identify possible network addresses from different source networks belonging to the same company and region is:

function y() { dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F ''.in-addr'' '{print $1}').origin.asn.cymru.com TXT +short }

This function takes an IP address as an argument and performs two DNS lookups using the dig command. The first lookup uses the -x option to perform a reverse DNS lookup and get the hostname associated with the IP address. The second lookup uses the origin.asn.cymru.com domain to get the autonomous system number (ASN) and other information related to the IP address, such as the country code, registry, or allocation date. The function then prints the IP address and the ASN information, which can help identify any network addresses that belong to the same ASN or region

asked 02/10/2024
TONG CHEE LOONG
41 questions

Question 29

Report Export Collapse

A security analyst is writing a shell script to identify IP addresses from the same country. Which of the following functions would help the analyst achieve the objective?

function w() { info=$(ping -c 1 $1 | awk -F ''/'' 'END{print $1}') && echo ''$1 | $info'' }
function w() { info=$(ping -c 1 $1 | awk -F ''/'' 'END{print $1}') && echo ''$1 | $info'' }
function x() { info=$(geoiplookup $1) && echo ''$1 | $info'' }
function x() { info=$(geoiplookup $1) && echo ''$1 | $info'' }
function y() { info=$(dig -x $1 | grep PTR | tail -n 1 ) && echo ''$1 | $info'' }
function y() { info=$(dig -x $1 | grep PTR | tail -n 1 ) && echo ''$1 | $info'' }
function z() { info=$(traceroute -m 40 $1 | awk 'END{print $1}') && echo ''$1 | $info'' }
function z() { info=$(traceroute -m 40 $1 | awk 'END{print $1}') && echo ''$1 | $info'' }
Suggested answer: B
Explanation:

The function that would help the analyst identify IP addresses from the same country is:

function x() { info=$(geoiplookup $1) && echo ''$1 | $info'' }

This function takes an IP address as an argument and uses the geoiplookup command to get the geographic location information associated with the IP address, such as the country name, country code, region, city, or latitude and longitude. The function then prints the IP address and the geographic location information, which can help identify any IP addresses that belong to the same country.

asked 02/10/2024
MARIO CRUZ
44 questions

Question 30

Report Export Collapse

A security analyst obtained the following table of results from a recent vulnerability assessment that was conducted against a single web server in the environment:

CompTIA CS0-003 image Question 30 94651 10022024175105000000

Which of the following should be completed first to remediate the findings?

Ask the web development team to update the page contents
Ask the web development team to update the page contents
Add the IP address allow listing for control panel access
Add the IP address allow listing for control panel access
Purchase an appropriate certificate from a trusted root CA
Purchase an appropriate certificate from a trusted root CA
Perform proper sanitization on all fields
Perform proper sanitization on all fields
Suggested answer: D
Explanation:

The first action that should be completed to remediate the findings is to perform proper sanitization on all fields. Sanitization is a process that involves validating, filtering, or encoding any user input or data before processing or storing it on a system or application. Sanitization can help prevent various types of attacks, such as cross-site scripting (XSS), SQL injection, or command injection, that exploit unsanitized input or data to execute malicious scripts, commands, or queries on a system or application. Performing proper sanitization on all fields can help address the most critical and common vulnerability found during the vulnerability assessment, which is XSS.

asked 02/10/2024
Andrew Chan
41 questions
Total 431 questions
Go to page: of 44
Search

Related questions