ExamGecko
Home Home / CompTIA / CS0-003

CompTIA CS0-003 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











A security analyst has received an incident case regarding malware spreading out of control on a customer's network. The analyst is unsure how to respond. The configured EDR has automatically obtained a sample of the malware and its signature. Which of the following should the analyst perform next to determine the type of malware, based on its telemetry?

A.
Cross-reference the signature with open-source threat intelligence.
A.
Cross-reference the signature with open-source threat intelligence.
Answers
B.
Configure the EDR to perform a full scan.
B.
Configure the EDR to perform a full scan.
Answers
C.
Transfer the malware to a sandbox environment.
C.
Transfer the malware to a sandbox environment.
Answers
D.
Log in to the affected systems and run necstat.
D.
Log in to the affected systems and run necstat.
Answers
Suggested answer: A

Explanation:

The signature of the malware is a unique identifier that can be used to compare it with known malware samples and their behaviors. Open-source threat intelligence sources provide information on various types of malware, their indicators of compromise, and their mitigation strategies. By cross-referencing the signature with these sources, the analyst can determine the type of malware and its telemetry. The other options are not relevant for this purpose: configuring the EDR to perform a full scan may not provide additional information on the malware type; transferring the malware to a sandbox environment may expose the analyst to further risks; logging in to the affected systems and running netstat may not reveal the malware activity.

According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of EDR, a tool used for endpoint security, in chapter 5. Specifically, it explains the meaning and function of malware signatures and how they can be used to identify malware types1, page 203. It also discusses the benefits and challenges of using open-source threat intelligence sources to enhance security analysis1, page 211. Therefore, this is a reliable source to verify the answer to the question.

While reviewing the web server logs, a security analyst notices the following snippet:

.. \ .. / .. \ .. /boot.ini

Which of the following Is belng attempted?

A.
Directory traversal
A.
Directory traversal
Answers
B.
Remote file inclusion
B.
Remote file inclusion
Answers
C.
Cross-site scripting
C.
Cross-site scripting
Answers
D.
Remote code execution
D.
Remote code execution
Answers
E.
Enumeration of /etc/passwd
E.
Enumeration of /etc/passwd
Answers
Suggested answer: A

Explanation:

The snippet shows an attempt to access the boot.ini file, which is a configuration file for Windows operating systems. The ''... \ ... /'' pattern is used to navigate up the directory structure and reach the root directory, where the boot.ini file is located. This is a common technique for exploiting directory traversal vulnerabilities, which allow an attacker to access files and directories outside the intended web server path. The other options are not relevant for this purpose: remote file inclusion involves injecting a malicious file into a web application; cross-site scripting involves injecting malicious scripts into a web page; remote code execution involves executing arbitrary commands on a remote system; enumeration of /etc/passwd involves accessing the file that stores user information on Linux systems.

According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of web server logs, which record the requests and responses of web applications, in chapter 6. Specifically, it explains the meaning and function of each component in web server logs, such as the HTTP method, the URL, the status code, and the user agent1, page 244. It also discusses the common types and indicators of web-based attacks, such as directory traversal, which use special characters to manipulate the web server path1, page 251. Therefore, this is a reliable source to verify the answer to the question.

The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its investment in tools and systems to protect its data. Which of the following did the CISO most likely select?

A.
PCI DSS
A.
PCI DSS
Answers
B.
COBIT
B.
COBIT
Answers
C.
ISO 27001
C.
ISO 27001
Answers
D.
ITIL
D.
ITIL
Answers
Suggested answer: C

Explanation:

ISO 27001 is an international standard that establishes a framework for implementing, maintaining, and improving an information security management system (ISMS). It helps organizations demonstrate their commitment to protecting their data and complying with various regulations and best practices. The other options are not relevant for this purpose: PCI DSS is a standard that focuses on protecting payment card data; COBIT is a framework that provides guidance on governance and management of enterprise IT; ITIL is a framework that provides guidance on service management and delivery.

According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of various cybersecurity frameworks and standards, such as ISO 27001, PCI DSS, COBIT, and ITIL, in chapter 1. Specifically, it explains the meaning and function of each framework and standard, such as ISO 27001, which provides a comprehensive approach to information security management1, page 29. Therefore, this is a reliable source to verify the answer to the question.

A security analyst has prepared a vulnerability scan that contains all of the company's functional subnets. During the initial scan, users reported that network printers began to print pages that contained unreadable text and icons.

Which of the following should the analyst do to ensure this behavior does not oocur during subsequent vulnerability scans?

A.
Perform non-credentialed scans.
A.
Perform non-credentialed scans.
Answers
B.
Ignore embedded web server ports.
B.
Ignore embedded web server ports.
Answers
C.
Create a tailored scan for the printer subnet.
C.
Create a tailored scan for the printer subnet.
Answers
D.
Increase the threshold length of the scan timeout.
D.
Increase the threshold length of the scan timeout.
Answers
Suggested answer: C

Explanation:

The best way to prevent network printers from printing pages during a vulnerability scan is to create a tailored scan for the printer subnet that excludes the ports and services that trigger the printing behavior. The other options are not effective for this purpose: performing non-credentialed scans may not reduce the impact on the printers; ignoring embedded web server ports may not cover all the possible ports that cause printing; increasing the threshold length of the scan timeout may not prevent the printing from occurring.

According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of vulnerability scanning tools, such as Nessus, Nmap, and Qualys, in chapter 4. Specifically, it explains the meaning and function of each component in vulnerability scanning, such as credentialed vs. non-credentialed scans, port scanning, and scan scheduling1, pages 149-160. It also discusses the common issues and challenges of vulnerability scanning, such as network disruptions, false positives, and scan scope1, pages 161-162. Therefore, this is a reliable source to verify the answer to the question.

A vulnerability analyst is writing a report documenting the newest, most critical vulnerabilities identified in the past month. Which of the following public MITRE repositories would be best to review?

A.
Cyber Threat Intelligence
A.
Cyber Threat Intelligence
Answers
B.
Common Vulnerabilities and Exposures
B.
Common Vulnerabilities and Exposures
Answers
C.
Cyber Analytics Repository ATT&CK
C.
Cyber Analytics Repository ATT&CK
Answers
Suggested answer: B

Explanation:

The Common Vulnerabilities and Exposures (CVE) is a public repository of standardized identifiers and descriptions for common cybersecurity vulnerabilities. It helps security analysts to identify, prioritize, and report on the most critical vulnerabilities in their systems and applications.The other options are not relevant for this purpose: Cyber Threat Intelligence (CTI) is a collection of information and analysis on current and emerging cyber threats; Cyber Analytics Repository (CAR) is a knowledge base of analytics developed by MITRE based on the ATT&CK adversary model; ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Reference: According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of various cybersecurity frameworks and standards, such as CVE, CTI, CAR, and ATT&CK, in chapter 1.Specifically, it explains the meaning and function of each framework and standard, such as CVE, which provides a common language for describing and sharing information about vulnerabilities1, page 28. Therefore, this is a reliable source to verify the answer to the question.



Following an attack, an analyst needs to provide a summary of the event to the Chief Information Security Officer. The summary needs to include the who-what-when information and evaluate the effectiveness of the plans in place. Which of the following incident management life cycle processes does this describe?

A.
Business continuity plan
A.
Business continuity plan
Answers
B.
Lessons learned
B.
Lessons learned
Answers
C.
Forensic analysis
C.
Forensic analysis
Answers
D.
Incident response plan
D.
Incident response plan
Answers
Suggested answer: B

Explanation:

The lessons learned process is the final stage of the incident management life cycle, where the incident team reviews the incident and evaluates the effectiveness of the response and the plans in place. The lessons learned report should include the who-what-when information and any recommendations for improvement123

Reference: 1: What is incident management? Steps, tips, and best practices 2: 5 Steps of the Incident Management Lifecycle | RSI Security 3: Navigating the Incident Response Life Cycle: A Comprehensive Guide

An email hosting provider added a new data center with new public IP addresses. Which of the following most likely needs to be updated to ensure emails from the new data center do not get blocked by spam filters?

A.
DKIM
A.
DKIM
Answers
B.
SPF
B.
SPF
Answers
C.
SMTP
C.
SMTP
Answers
D.
DMARC
D.
DMARC
Answers
Suggested answer: B

Explanation:

SPF (Sender Policy Framework) is a DNS TXT record that lists authorized sending IP addresses for a given domain. If an email hosting provider added a new data center with new public IP addresses, the SPF record needs to be updated to include those new IP addresses, otherwise the emails from the new data center may fail SPF checks and get blocked by spam filters123

Reference: 1: Use DMARC to validate email, setup steps 2: How to set up SPF, DKIM and DMARC: other mail & hosting providers providers 3: Set up SPF, DKIM, or DMARC records for my hosting email

The SOC received a threat intelligence notification indicating that an employee's credentials were found on the dark web. The user's web and log-in activities were reviewed for malicious or anomalous connections, data uploads/downloads, and exploits. A review of the controls confirmed multifactor authentication was enabled. Which of the following should be done first to mitigate impact to the business networks and assets?

A.
Perform a forced password reset.
A.
Perform a forced password reset.
Answers
B.
Communicate the compromised credentials to the user.
B.
Communicate the compromised credentials to the user.
Answers
C.
Perform an ad hoc AV scan on the user's laptop.
C.
Perform an ad hoc AV scan on the user's laptop.
Answers
D.
Review and ensure privileges assigned to the user's account reflect least privilege.
D.
Review and ensure privileges assigned to the user's account reflect least privilege.
Answers
E.
Lower the thresholds for SOC alerting of suspected malicious activity.
E.
Lower the thresholds for SOC alerting of suspected malicious activity.
Answers
Suggested answer: A

Explanation:

The first and most urgent step to mitigate the impact of compromised credentials on the dark web is to perform a forced password reset for the affected user. This will prevent the cybercriminals from using the stolen credentials to access the company's network and systems. Multifactor authentication is a good security measure, but it is not foolproof and can be bypassed by sophisticated attackers. Therefore, changing the password as soon as possible is the best practice to reduce the risk of a data breach or other cyber attack123

Reference: 1: How to monitor the dark web for compromised employee credentials 2: How to prevent corporate credentials ending up on the dark web 3: Data Breach Prevention: Identifying Leaked Credentials on the Dark Web

A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers. Which of the following actions would allow the analyst to achieve the objective?

A.
Upload the binary to an air-gapped sandbox for analysis.
A.
Upload the binary to an air-gapped sandbox for analysis.
Answers
B.
Send the binaries to the antivirus vendor.
B.
Send the binaries to the antivirus vendor.
Answers
C.
Execute the binaries on an environment with internet connectivity.
C.
Execute the binaries on an environment with internet connectivity.
Answers
D.
Query the file hashes using VirusTotal.
D.
Query the file hashes using VirusTotal.
Answers
Suggested answer: A

Explanation:

An air-gapped sandbox is a virtual machine or a physical device that is isolated from any network connection. This allows the analyst to safely execute the malware binaries and observe their behavior without risking any communication with the attackers or any damage to other systems. Uploading the binary to an air-gapped sandbox is the best option to gather intelligence without disclosing information to the attackers12

Reference: 1: Dynamic Analysis of a Windows Malicious Self-Propagating Binary 2: GitHub - mikesiko/PracticalMalwareAnalysis-Labs: Binaries for the book Practical Malware Analysis

Which of the following is the most appropriate action a security analyst to take to effectively identify the most security risks associated with a locally hosted server?

A.
Run the operating system update tool to apply patches that are missing.
A.
Run the operating system update tool to apply patches that are missing.
Answers
B.
Contract an external penetration tester to attempt a brute-force attack.
B.
Contract an external penetration tester to attempt a brute-force attack.
Answers
C.
Download a vendor support agent to validate drivers that are installed.
C.
Download a vendor support agent to validate drivers that are installed.
Answers
D.
Execute a vulnerability scan against the target host.
D.
Execute a vulnerability scan against the target host.
Answers
Suggested answer: D

Explanation:

A vulnerability scan is a process of identifying and assessing the security weaknesses of a system or network. A vulnerability scan can help a security analyst to effectively identify the most security risks associated with a locally hosted server, such as missing patches, misconfigurations, outdated software, or exposed services. A vulnerability scan can also provide recommendations on how to remediate the identified vulnerabilities and improve the security posture of the server12

Reference: 1: What is a Vulnerability Scan? | Definition and Examples 2: Securing a server: risks, challenges and best practices - Vaadata

Total 368 questions
Go to page: of 37