CompTIA CS0-003 Practice Test - Questions Answers, Page 35
List of questions
Related questions
Which of the following best explains the importance of network microsegmentation as part of a Zero Trust architecture?
To allow policies that are easy to manage and less granular
To increase the costs associated with regulatory compliance
To limit how far an attack can spread
To reduce hardware costs with the use of virtual appliances
A company's internet-facing web application has been compromised several times due to identified design flaws. The company would like to minimize the risk of these incidents from reoccurring and has provided the developers with better security training. However, the company cannot allocate any more internal resources to the issue. Which of the following are the best options to help identify flaws within the system? (Select two).
Deploying a WAF
Performing a forensic analysis
Contracting a penetration test
Holding a tabletop exercise
Creating a bug bounty program
Implementing threat modeling
Which of the following responsibilities does the legal team have during an incident management event? (Select two).
Coordinate additional or temporary staffing for recovery efforts.
Review and approve new contracts acquired as a result of an event.
Advise the Incident response team on matters related to regulatory reporting.
Ensure all system security devices and procedures are in place.
Conduct computer and network damage assessments for insurance.
Verify that all security personnel have the appropriate clearances.
Executives at an organization email sensitive financial information to external business partners when negotiating valuable contracts. To ensure the legal validity of these messages, the cybersecurity team recommends a digital signature be added to emails sent by the executives. Which of the following are the primary goals of this recommendation? (Select two).
Confidentiality
Integrity
Privacy
Anonymity
Non-repudiation
Authorization
A company patches its servers using automation software. Remote SSH or RDP connections are allowed to the servers only from the service account used by the automation software. All servers are in an internal subnet without direct access to or from the internet. An analyst reviews the following vulnerability summary:
Which of the following vulnerability IDs should the analyst address first?
1
2
3
4
Which of the following in the digital forensics process is considered a critical activity that often includes a graphical representation of process and operating system events?
Registry editing
Network mapping
Timeline analysis
Write blocking
A SOC team lead occasionally collects some DNS information for investigations. The team lead assigns this task to a new junior analyst. Which of the following is the best way to relay the process information to the junior analyst?
Ask another team member to demonstrate their process.
Email a link to a website that shows someone demonstrating a similar process.
Let the junior analyst research and develop a process.
Write a step-by-step document on the team wiki outlining the process.
An organization identifies a method to detect unexpected behavior, crashes, or resource leaks in a system by feeding invalid, unexpected, or random data to stress the application. Which of the following best describes this testing methodology?
Reverse engineering
Static
Fuzzing
Debugging
Which of the following responsibilities does the legal team have during an incident management event? (Select two).
Coordinate additional or temporary staffing for recovery efforts.
Review and approve new contracts acquired as a result of an event.
Advise the incident response team on matters related to regulatory reporting.
Ensure all system security devices and procedures are in place.
Conduct computer and network damage assessments for insurance.
Verify that all security personnel have the appropriate clearances.
Which of the following best explains the importance of the implementation of a secure software development life cycle in a company with an internal development team?
Increases the product price by using the implementation as a piece of marketing
Decreases the risks of the software usage and complies with regulatory requirements
Improves the agile process and decreases the amount of tests before the final deployment
Transfers the responsibility for security flaws to the vulnerability management team
Question