ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 37

Add to Whishlist

List of questions

Question 361

Report Export Collapse

An XSS vulnerability was reported on one of the public websites of a company. The security department confirmed the finding and needs to provide a recommendation to the application owner. Which of the following recommendations will best prevent this vulnerability from being exploited? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 362

Report Export Collapse

Which of the following characteristics ensures the security of an automated information system is the most effective and economical?

Become a Premium Member for full access
  Unlock Premium Member

Question 363

Report Export Collapse

After an upgrade to a new EDR, a security analyst received reports that several endpoints were not communicating with the SaaS provider to receive critical threat signatures. To comply with the incident response playbook, the security analyst was required to validate connectivity to ensure communications. The security analyst ran a command that provided the following output:

ComputerName: comptia007

RemotePort: 443

InterfaceAlias: Ethernet 3

TcpTestSucceeded: False

Which of the following did the analyst use to ensure connectivity?

Become a Premium Member for full access
  Unlock Premium Member

Question 364

Report Export Collapse

An employee received a phishing email that contained malware targeting the company. Which of the following is the best way for a security analyst to get more details about the malware and avoid disclosing information?

Become a Premium Member for full access
  Unlock Premium Member

Question 365

Report Export Collapse

A security analyst needs to develop a solution to protect a high-value asset from an exploit like a recent zero-day attack. Which of the following best describes this risk management strategy?

Become a Premium Member for full access
  Unlock Premium Member

Question 366

Report Export Collapse

Which of the following documents sets requirements and metrics for a third-party response during an event?

Become a Premium Member for full access
  Unlock Premium Member

Question 367

Report Export Collapse

A security analyst needs to identify a computer based on the following requirements to be mitigated:

The attack method is network-based with low complexity.

No privileges or user action is needed.

The confidentiality and availability level is high, with a low integrity level.

Given the following CVSS 3.1 output:

Computer1: CVSS3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H

Computer2: CVSS3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H

Computer3: CVSS3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H

Computer4: CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H

Which of the following machines should the analyst mitigate?

Become a Premium Member for full access
  Unlock Premium Member

Question 368

Report Export Collapse

Which of the following are process improvements that can be realized by implementing a SOAR solution? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 369

Report Export Collapse

An organization is planning to adopt a zero-trust architecture. Which of the following is most aligned with this approach?

Become a Premium Member for full access
  Unlock Premium Member

Question 370

Report Export Collapse

An analyst reviews the following web server log entries:

%2E%2E/%2E%2E/%2ES2E/%2E%2E/%2E%2E/%2E%2E/etc/passwd

No attacks or malicious attempts have been discovered. Which of the following most likely describes what took place?

Become a Premium Member for full access
  Unlock Premium Member
Total 431 questions
Go to page: of 44
Search

Related questions