ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 34

Add to Whishlist

List of questions

Question 331

Report Export Collapse

A systems administrator needs to gather security events with repeatable patterns from Linux log files. Which of the following would the administrator most likely use for this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 332

Report Export Collapse

An analyst is reviewing a dashboard from the company's SIEM and finds that an IP address known to be malicious can be tracked to numerous high-priority events in the last two hours. The dashboard indicates that these events relate to TTPs. Which of the following is the analyst most likely using?

Become a Premium Member for full access
  Unlock Premium Member

Question 333

Report Export Collapse

A SOC analyst observes reconnaissance activity from an IP address. The activity follows a pattern of short bursts toward a low number of targets. An open-source review shows that the IP has a bad reputation. The perimeter firewall logs indicate the inbound traffic was allowed. The destination hosts are high-value assets with EDR agents installed. Which of the following is the best action for the SOC to take to protect against any further activity from the source IP?

Become a Premium Member for full access
  Unlock Premium Member

Question 334

Report Export Collapse

SIMULATION

An organization's website was maliciously altered.

INSTRUCTIONS

Review information in each tab to select the source IP the analyst should be concerned about, the indicator of compromise, and the two appropriate corrective actions.

CompTIA CS0-003 image Question 334 120543 10172024012515000000

CompTIA CS0-003 image Question 334 120543 10172024012515000000

CompTIA CS0-003 image Question 334 120543 10172024012515000000

CompTIA CS0-003 image Question 334 120543 10172024012515000000

Become a Premium Member for full access
  Unlock Premium Member

Question 335

Report Export Collapse

SIMULATION

A systems administrator is reviewing the output of a vulnerability scan.

INSTRUCTIONS

Review the information in each tab.

Based on the organization's environment architecture and remediation standards, select the server to be patched within 14 days and select the appropriate technique and mitigation.

CompTIA CS0-003 image Question 335 120544 10172024012515000000

CompTIA CS0-003 image Question 335 120544 10172024012515000000

CompTIA CS0-003 image Question 335 120544 10172024012515000000

CompTIA CS0-003 image Question 335 120544 10172024012515000000

Become a Premium Member for full access
  Unlock Premium Member

Question 336

Report Export Collapse

A new SOC manager reviewed findings regarding the strengths and weaknesses of the last tabletop exercise in order to make improvements. Which of the following should the SOC manager utilize to improve the process?

Become a Premium Member for full access
  Unlock Premium Member

Question 337

Report Export Collapse

K company has recently experienced a security breach via a public-facing service. Analysis of the event on the server was traced back to the following piece of code:

SELECT ' From userjdata WHERE Username = 0 and userid8 1 or 1=1;---

Which of the following controls would be best to implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 338

Report Export Collapse

A report contains IoC and TTP information for a zero-day exploit that leverages vulnerabilities in a specific version of a web application. Which of the following actions should a SOC analyst take first after receiving the report?

Become a Premium Member for full access
  Unlock Premium Member

Question 339

Report Export Collapse

A systems administrator is reviewing after-hours traffic flows from data center servers and sees regular, outgoing HTTPS connections from one of the servers to a public IP address. The server should not be making outgoing connections after hours. Looking closer, the administrator sees this traffic pattern around the clock during work hours as well. Which of the following is the most likely explanation?

Become a Premium Member for full access
  Unlock Premium Member

Question 340

Report Export Collapse

A web application has a function to retrieve content from an internal URL to identify CSRF attacks in the logs. The security analyst is building a regular expression that will filter out the correctly formatted requests. The target URL is https://10.1.2.3/api, and the receiving API only accepts GET requests and uses a single integer argument named 'id.' Which of the following regular expressions should the analyst use to achieve the objective?

Become a Premium Member for full access
  Unlock Premium Member
Total 437 questions
Go to page: of 44
Search

Related questions