ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 30

Add to Whishlist

List of questions

Question 291

Report Export Collapse

A security analyst has received an incident case regarding malware spreading out of control on a customer's network. The analyst is unsure how to respond. The configured EDR has automatically obtained a sample of the malware and its signature. Which of the following should the analyst perform next to determine the type of malware, based on its telemetry?

Become a Premium Member for full access
  Unlock Premium Member

Question 292

Report Export Collapse

While reviewing the web server logs, a security analyst notices the following snippet:

.. \ .. / .. \ .. /boot.ini

Which of the following Is belng attempted?

Become a Premium Member for full access
  Unlock Premium Member

Question 293

Report Export Collapse

The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its investment in tools and systems to protect its data. Which of the following did the CISO most likely select?

Become a Premium Member for full access
  Unlock Premium Member

Question 294

Report Export Collapse

A security analyst has prepared a vulnerability scan that contains all of the company's functional subnets. During the initial scan, users reported that network printers began to print pages that contained unreadable text and icons.

Which of the following should the analyst do to ensure this behavior does not oocur during subsequent vulnerability scans?

Become a Premium Member for full access
  Unlock Premium Member

Question 295

Report Export Collapse

A vulnerability analyst is writing a report documenting the newest, most critical vulnerabilities identified in the past month. Which of the following public MITRE repositories would be best to review?

Become a Premium Member for full access
  Unlock Premium Member

Question 296

Report Export Collapse

Following an attack, an analyst needs to provide a summary of the event to the Chief Information Security Officer. The summary needs to include the who-what-when information and evaluate the effectiveness of the plans in place. Which of the following incident management life cycle processes does this describe?

Become a Premium Member for full access
  Unlock Premium Member

Question 297

Report Export Collapse

An email hosting provider added a new data center with new public IP addresses. Which of the following most likely needs to be updated to ensure emails from the new data center do not get blocked by spam filters?

Become a Premium Member for full access
  Unlock Premium Member

Question 298

Report Export Collapse

The SOC received a threat intelligence notification indicating that an employee's credentials were found on the dark web. The user's web and log-in activities were reviewed for malicious or anomalous connections, data uploads/downloads, and exploits. A review of the controls confirmed multifactor authentication was enabled. Which of the following should be done first to mitigate impact to the business networks and assets?

Become a Premium Member for full access
  Unlock Premium Member

Question 299

Report Export Collapse

A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers. Which of the following actions would allow the analyst to achieve the objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 300

Report Export Collapse

Which of the following is the most appropriate action a security analyst to take to effectively identify the most security risks associated with a locally hosted server?

Become a Premium Member for full access
  Unlock Premium Member
Total 437 questions
Go to page: of 44
Search

Related questions