CompTIA CS0-003 Practice Test - Questions Answers, Page 34
List of questions
Related questions
A systems administrator needs to gather security events with repeatable patterns from Linux log files. Which of the following would the administrator most likely use for this task?
A regular expression in Bash
Filters in the vi editor
Variables in a PowerShell script
A playbook in a SOAR tool
An analyst is reviewing a dashboard from the company's SIEM and finds that an IP address known to be malicious can be tracked to numerous high-priority events in the last two hours. The dashboard indicates that these events relate to TTPs. Which of the following is the analyst most likely using?
MITRE ATT&CK
OSSTMM
Diamond Model of Intrusion Analysis
OWASP
A SOC analyst observes reconnaissance activity from an IP address. The activity follows a pattern of short bursts toward a low number of targets. An open-source review shows that the IP has a bad reputation. The perimeter firewall logs indicate the inbound traffic was allowed. The destination hosts are high-value assets with EDR agents installed. Which of the following is the best action for the SOC to take to protect against any further activity from the source IP?
Add the IP address to the EDR deny list.
Create a SIEM signature to trigger on any activity from the source IP subnet detected by the web proxy or firewalls for immediate notification.
Implement a prevention policy for the IP on the WAF.
Activate the scan signatures for the IP on the NGFWs.
SIMULATION
An organization's website was maliciously altered.
INSTRUCTIONS
Review information in each tab to select the source IP the analyst should be concerned about, the indicator of compromise, and the two appropriate corrective actions.
see the explanation for step by step solution.
SIMULATION
A systems administrator is reviewing the output of a vulnerability scan.
INSTRUCTIONS
Review the information in each tab.
Based on the organization's environment architecture and remediation standards, select the server to be patched within 14 days and select the appropriate technique and mitigation.
see the explanation for step by step solution
A new SOC manager reviewed findings regarding the strengths and weaknesses of the last tabletop exercise in order to make improvements. Which of the following should the SOC manager utilize to improve the process?
The most recent audit report
The incident response playbook
The incident response plan
The lessons-learned register
K company has recently experienced a security breach via a public-facing service. Analysis of the event on the server was traced back to the following piece of code:
SELECT ' From userjdata WHERE Username = 0 and userid8 1 or 1=1;---
Which of the following controls would be best to implement?
Deploy a wireless application protocol.
Remove the end-of-life component.
Implement proper access control.
Validate user input.
A report contains IoC and TTP information for a zero-day exploit that leverages vulnerabilities in a specific version of a web application. Which of the following actions should a SOC analyst take first after receiving the report?
Implement a vulnerability scan to determine whether the environment is at risk.
Block the IP addresses and domains from the report in the web proxy and firewalls.
Verify whether the information is relevant to the organization.
Analyze the web application logs to identify any suspicious or malicious activity.
A systems administrator is reviewing after-hours traffic flows from data center servers and sees regular, outgoing HTTPS connections from one of the servers to a public IP address. The server should not be making outgoing connections after hours. Looking closer, the administrator sees this traffic pattern around the clock during work hours as well. Which of the following is the most likely explanation?
Command-and-control beaconing activity
Data exfiltration
Anomalous activity on unexpected ports
Network host IP address scanning
A rogue network device
A web application has a function to retrieve content from an internal URL to identify CSRF attacks in the logs. The security analyst is building a regular expression that will filter out the correctly formatted requests. The target URL is https://10.1.2.3/api, and the receiving API only accepts GET requests and uses a single integer argument named 'id.' Which of the following regular expressions should the analyst use to achieve the objective?
(?!https://10\.1\.2\.3/api\?id=[0-9]+)
'https://10\.1\.2\.3/api\?id=\d+
(?:'https://10\.1\.2\.3/api\?id-[0-9]+)
https://10\.1\.2\.3/api\?id[0-9J$
Question