CompTIA CS0-003 Practice Test - Questions Answers, Page 35

List of questions
Question 341

Which of the following best explains the importance of network microsegmentation as part of a Zero Trust architecture?
Question 342

A company's internet-facing web application has been compromised several times due to identified design flaws. The company would like to minimize the risk of these incidents from reoccurring and has provided the developers with better security training. However, the company cannot allocate any more internal resources to the issue. Which of the following are the best options to help identify flaws within the system? (Select two).
Question 343

Which of the following responsibilities does the legal team have during an incident management event? (Select two).
Question 344

Executives at an organization email sensitive financial information to external business partners when negotiating valuable contracts. To ensure the legal validity of these messages, the cybersecurity team recommends a digital signature be added to emails sent by the executives. Which of the following are the primary goals of this recommendation? (Select two).
Question 345

A company patches its servers using automation software. Remote SSH or RDP connections are allowed to the servers only from the service account used by the automation software. All servers are in an internal subnet without direct access to or from the internet. An analyst reviews the following vulnerability summary:
Which of the following vulnerability IDs should the analyst address first?
Question 346

Which of the following in the digital forensics process is considered a critical activity that often includes a graphical representation of process and operating system events?
Question 347

A SOC team lead occasionally collects some DNS information for investigations. The team lead assigns this task to a new junior analyst. Which of the following is the best way to relay the process information to the junior analyst?
Question 348

An organization identifies a method to detect unexpected behavior, crashes, or resource leaks in a system by feeding invalid, unexpected, or random data to stress the application. Which of the following best describes this testing methodology?
Question 349

Which of the following responsibilities does the legal team have during an incident management event? (Select two).
Question 350

Which of the following best explains the importance of the implementation of a secure software development life cycle in a company with an internal development team?
Question