CompTIA CS0-003 Practice Test - Questions Answers, Page 37
List of questions
Related questions
An XSS vulnerability was reported on one of the public websites of a company. The security department confirmed the finding and needs to provide a recommendation to the application owner. Which of the following recommendations will best prevent this vulnerability from being exploited? (Select two).
Implement an IPS in front of the web server.
Enable MFA on the website.
Take the website offline until it is patched.
Implement a compensating control in the source code.
Configure TLS v1.3 on the website.
Fix the vulnerability using a virtual patch at the WAF.
Which of the following characteristics ensures the security of an automated information system is the most effective and economical?
Originally designed to provide necessary security
Subjected to intense security testing
Customized to meet specific security threats
Optimized prior to the addition of security
After an upgrade to a new EDR, a security analyst received reports that several endpoints were not communicating with the SaaS provider to receive critical threat signatures. To comply with the incident response playbook, the security analyst was required to validate connectivity to ensure communications. The security analyst ran a command that provided the following output:
ComputerName: comptia007
RemotePort: 443
InterfaceAlias: Ethernet 3
TcpTestSucceeded: False
Which of the following did the analyst use to ensure connectivity?
nmap
tnc
ping
tracert
An employee received a phishing email that contained malware targeting the company. Which of the following is the best way for a security analyst to get more details about the malware and avoid disclosing information?
Upload the malware to the VirusTotal website
Share the malware with the EDR provider
Hire an external consultant to perform the analysis
Use a local sandbox in a microsegmented environment
A security analyst needs to develop a solution to protect a high-value asset from an exploit like a recent zero-day attack. Which of the following best describes this risk management strategy?
Avoid
Transfer
Accept
Mitigate
Which of the following documents sets requirements and metrics for a third-party response during an event?
BIA
DRP
SLA
MOU
A security analyst needs to identify a computer based on the following requirements to be mitigated:
The attack method is network-based with low complexity.
No privileges or user action is needed.
The confidentiality and availability level is high, with a low integrity level.
Given the following CVSS 3.1 output:
Computer1: CVSS3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
Computer2: CVSS3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
Computer3: CVSS3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H
Computer4: CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
Which of the following machines should the analyst mitigate?
Computer1
Computer2
Computer3
Computer4
Which of the following are process improvements that can be realized by implementing a SOAR solution? (Select two).
Minimize security attacks
Itemize tasks for approval
Reduce repetitive tasks
Minimize setup complexity
Define a security strategy
Generate reports and metrics
Question