ExamGecko
Home Home / CompTIA / CS0-003

CompTIA CS0-003 Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its investment in tools and systems to protect its data. Which of the following did the CISO most likely select?

A.
PCI DSS
A.
PCI DSS
Answers
B.
COBIT
B.
COBIT
Answers
C.
ISO 27001
C.
ISO 27001
Answers
D.
ITIL
D.
ITIL
Answers
Suggested answer: C

An MSSP received several alerts from customer 1, which caused a missed incident response deadline for customer 2. Which of the following best describes the document that was violated?

A.
KPI
A.
KPI
Answers
B.
SLO
B.
SLO
Answers
C.
SLA
C.
SLA
Answers
D.
MOU
D.
MOU
Answers
Suggested answer: C

Explanation:

An SLA, or Service Level Agreement, is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet. In the scenario described, the missed incident response deadline is a clear indicator of an SLA violation. An SLA usually outlines the metrics by which service is measured as well as remedies or penalties should agreed-upon service levels not be achieved. Unlike a KPI (Key Performance Indicator) which is a quantifiable measure used to evaluate the success of an organization, employee, etc., in meeting objectives for performance, or an MOU (Memorandum of Understanding) which is a formal agreement between two or more parties, an SLA is focused on the performance and quality metrics applicable to the service provided. SLO (Service Level Objective) is related and often part of an SLA, representing the specific measurable characteristics of the SLA such as availability, throughput, frequency, response time, or quality.

A high volume of failed RDP authentication attempts was logged on a critical server within a one-hour period. All of the attempts originated from the same remote IP address and made use of a single valid domain user account. Which of the following would be the most effective mitigating control to reduce the rate of success of this brute-force attack?

A.
Enabling a user account lockout after a limited number of failed attempts
A.
Enabling a user account lockout after a limited number of failed attempts
Answers
B.
Installing a third-party remote access tool and disabling RDP on all devices
B.
Installing a third-party remote access tool and disabling RDP on all devices
Answers
C.
Implementing a firewall block for the remote system's IP address
C.
Implementing a firewall block for the remote system's IP address
Answers
D.
Increasing the verbosity of log-on event auditing on all devices
D.
Increasing the verbosity of log-on event auditing on all devices
Answers
Suggested answer: A

Explanation:

Enabling a user account lockout policy is a security measure that can effectively mitigate brute-force attacks. After a predetermined number of consecutive failed login attempts, the account will be locked, preventing the attacker from continuing to try different password combinations. This control directly addresses the issue of multiple failed attempts from the same IP address using a single user account, making it the most effective among the options provided. Option B suggests replacing RDP with another remote access tool, which does not address the brute-force attempt but rather avoids the RDP protocol. Option C, implementing a firewall block, could be effective but does not prevent attacks from other IP addresses and may not be as immediate. Option D, increasing log verbosity, enhances monitoring but does not prevent the attack itself.

An analyst is investigating a phishing incident and has retrieved the following as part of the investigation:

cmd.exe /c c:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -EncodedCommand <VERY LONG STRING>

Which of the following should the analyst use to gather more information about the purpose of this command?

A.
Echo the command payload content into 'base64 -d'.
A.
Echo the command payload content into 'base64 -d'.
Answers
B.
Execute the command from a Windows VM.
B.
Execute the command from a Windows VM.
Answers
C.
Use a command console with administrator privileges to execute the code.
C.
Use a command console with administrator privileges to execute the code.
Answers
D.
Run the command as an unprivileged user from the analyst workstation.
D.
Run the command as an unprivileged user from the analyst workstation.
Answers
Suggested answer: A

Explanation:

The command in question involves an encoded PowerShell command, which is typically used by attackers to obfuscate malicious scripts. To decode and understand the payload, one would need to decode the base64 encoded string. This is why option A is the correct answer, as 'base64 -d' is a command used to decode data encoded with base64. This process will reveal the plaintext of the encoded command, which can then be analyzed to understand the actions that the attacker was attempting to perform. Option B is risky and not advised without a controlled and isolated environment. Option C is not safe because executing unknown or suspicious code with administrator privileges could cause harm to the system or network. Option D also poses a risk of executing potentially harmful code on an analyst's workstation.

The security team at a company, which was a recent target of ransomware, compiled a list of hosts that were identified as impacted and in scope for this incident. Based on the following host list:

Which of the following systems was most pivotal to the threat actor in its distribution of the encryption binary via Group Policy?

A.
SQL01
A.
SQL01
Answers
B.
WK10-Sales07
B.
WK10-Sales07
Answers
C.
WK7-Plant01
C.
WK7-Plant01
Answers
D.
DCEast01
D.
DCEast01
Answers
E.
HQAdmin9
E.
HQAdmin9
Answers
Suggested answer: D

Explanation:

Based on the list of hosts and their functions, DCEast01, which is a Domain Controller, would be the most pivotal in the distribution of an encryption binary via Group Policy. Domain Controllers are responsible for security and administrative policies within a Windows Domain. Group Policy is a feature of Windows that facilitates a wide range of advanced settings that administrators can use to control the working environment of user accounts and computer accounts. Group Policy can be used to deploy software, which in this case would be the encryption binary of the ransomware. SQL01 is a database server and unlikely to be used for this purpose. WK10-Sales07 and WK7-Plant01 are client machines, and HQAdmin9, although it is a network admin laptop, would not typically be used to distribute policies across a network.

Several reports with sensitive information are being disclosed via file sharing services. The company would like to improve its security posture against this threat. Which of the following security controls would best support the company in this scenario?

A.
Implement step-up authentication for administrators.
A.
Implement step-up authentication for administrators.
Answers
B.
Improve employee training and awareness.
B.
Improve employee training and awareness.
Answers
C.
Increase password complexity standards.
C.
Increase password complexity standards.
Answers
D.
Deploy mobile device management.
D.
Deploy mobile device management.
Answers
Suggested answer: B

Explanation:

Improving employee training and awareness is the best option to address the issue of sensitive reports being disclosed via file sharing services. By educating employees about the risks of unapproved file sharing, the security protocols to follow, and the proper channels to use for sharing company information, an organization can significantly reduce the risk of sensitive data being accidentally or intentionally shared on insecure platforms. This human-centric approach addresses the root cause of the problem. Options A, C, and D are security controls that do not directly address the behavior of sharing sensitive files on unauthorized services.

Which of the following best describes the key goal of the containment stage of an incident response process?

A.
To limit further damage from occurring
A.
To limit further damage from occurring
Answers
B.
To get services back up and running
B.
To get services back up and running
Answers
C.
To communicate goals and objectives of the incident response plan
C.
To communicate goals and objectives of the incident response plan
Answers
D.
To prevent data follow-on actions by adversary exfiltration
D.
To prevent data follow-on actions by adversary exfiltration
Answers
Suggested answer: A

Explanation:

The key goal of the containment stage in an incident response process is to limit further damage from occurring. This involves taking immediate steps to isolate the affected systems or network segments to prevent the spread of the incident and mitigate its impact. Containment strategies can be short-term, to quickly stop the incident, or long-term, to prepare for the eradication and recovery phases.

A company is launching a new application in its internal network, where internal customers can communicate with the service desk. The security team needs to ensure the application will be able to handle unexpected strings with anomalous formats without crashing. Which of the following processes is the most applicable for testing the application to find how it would behave in such a situation?

A.
Fuzzing
A.
Fuzzing
Answers
B.
Coding review
B.
Coding review
Answers
C.
Debugging
C.
Debugging
Answers
D.
Static analysis
D.
Static analysis
Answers
Suggested answer: A

Explanation:

Fuzzing is a process used to test applications by inputting unexpected or random data to see how the application behaves. This method is particularly effective in identifying vulnerabilities such as buffer overflows, input validation errors, and other anomalies that could cause the application to crash or behave unexpectedly. By using fuzzing, the security team can ensure the new application is robust and capable of handling unexpected strings with anomalous formats without crashing.

HOTSPOT

An organization has noticed large amounts of data are being sent out of its network. An analyst is identifying the cause of the data exfiltration.

INSTRUCTIONS

Select the command that generated the output in tabs 1 and 2.

Review the output text in all tabs and identify the file responsible for the malicious behavior.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


Question 319
Correct answer: Question 319

A healthcare organization must develop an action plan based on the findings from a risk assessment. The action plan must consist of:

* Risk categorization

* Risk prioritization

. Implementation of controls

INSTRUCTIONS

Click on the audit report, risk matrix, and SLA expectations documents to review their contents.

On the Risk categorization tab, determine the order in which the findings must be prioritized for remediation according to the risk rating score. Then, assign a categorization to each risk.

On the Controls tab, select the appropriate control(s) to implement for each risk finding.

Findings may have more than one control implemented. Some controls may be used more than once or not at all.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A.
See the solution below in Explanation
A.
See the solution below in Explanation
Answers
Suggested answer: A

Explanation:



Total 368 questions
Go to page: of 37