CompTIA CS0-003 Practice Test - Questions Answers, Page 4
List of questions
Related questions
A SOC analyst identifies the following content while examining the output of a debugger command over a client-server application:
getconnection (database01, 'alpha ' , 'AXTV. 127GdCx94GTd') ;
Which of the following is the most likely vulnerability in this system?
A company receives a penetration test report summary from a third party. The report summary indicates a proxy has some patches that need to be applied. The proxy is sitting in a rack and is not being used, as the company has replaced it with a new one. The CVE score of the vulnerability on the proxy is a 9.8. Which of the following best practices should the company follow with this proxy?
Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?
A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?
An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server?
Which of the following security operations tasks are ideal for automation?
An organization has experienced a breach of customer transactions. Under the terms of PCI DSS, which of the following groups should the organization report the breach to?
Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?
A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the following implications should be considered on the new hybrid environment?
A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a terminable offense, the SOC analyst collects the authentication logs, web logs, and temporary files, reflecting the web searches from the user's workstation, to build the case for the investigation. Which of the following is the best way to ensure that the investigation complies with HR or privacy policies?
Question