ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

Which of the following is the first step that should be performed when establishing a disaster recovery plan?

Agree on the goals and objectives of the plan
Agree on the goals and objectives of the plan
Determine the site to be used during a disaster C Demonstrate adherence to a standard disaster recovery process
Determine the site to be used during a disaster C Demonstrate adherence to a standard disaster recovery process
Identity applications to be run during a disaster
Identity applications to be run during a disaster
Suggested answer: A
Explanation:

The first step that should be performed when establishing a disaster recovery plan is to agree on the goals and objectives of the plan. The goals and objectives of the plan should define what the plan aims to achieve, such as minimizing downtime, restoring critical functions, ensuring data integrity, or meeting compliance requirements. The goals and objectives of the plan should also be aligned with the business needs and priorities of the organization and be measurable and achievable.

asked 02/10/2024
Muhammad Gul
47 questions

Question 42

Report Export Collapse

A technician identifies a vulnerability on a server and applies a software patch. Which of the following should be the next step in the remediation process?

Testing
Testing
Implementation
Implementation
Validation
Validation
Rollback
Rollback
Suggested answer: C
Explanation:

The next step in the remediation process after applying a software patch is validation. Validation is a process that involves verifying that the patch has been successfully applied, that it has fixed the vulnerability, and that it has not caused any adverse effects on the system or application functionality or performance. Validation can be done using various methods, such as scanning, testing, monitoring, or auditing.

asked 02/10/2024
Cynan Jones
43 questions

Question 43

Report Export Collapse

The analyst reviews the following endpoint log entry:

CompTIA CS0-003 image Question 43 94664 10022024175105000000

Which of the following has occurred?

Registry change
Registry change
Rename computer
Rename computer
New account introduced
New account introduced
Privilege escalation
Privilege escalation
Suggested answer: C
Explanation:

The endpoint log entry shows that a new account named ''admin'' has been created on a Windows system with a local group membership of ''Administrators''. This indicates that a new account has been introduced on the system with administrative privileges. This could be a sign of malicious activity, such as privilege escalation or backdoor creation, by an attacker who has compromised the system.

asked 02/10/2024
Musoke Kamuzze
43 questions

Question 44

Report Export Collapse

A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?

Data enrichment
Data enrichment
Security control plane
Security control plane
Threat feed combination
Threat feed combination
Single pane of glass
Single pane of glass
Suggested answer: D
Explanation:

A single pane of glass is a term that describes a unified view or interface that integrates multiple tools or data sources into one dashboard or console. A single pane of glass can help improve security operations by providing visibility, correlation, analysis, and alerting capabilities across various security controls and systems. A single pane of glass can also help reduce complexity, improve efficiency, and enhance decision making for security analysts. In this case, a security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM, which provides a single pane of glass for security operations. Official

Reference: https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/cyber-kill-chain-seven-steps-cyberattack

asked 02/10/2024
Freddy KUBIAK
57 questions

Question 45

Report Export Collapse

Due to reports of unauthorized activity that was occurring on the internal network, an analyst is performing a network discovery. The analyst runs an Nmap scan against a corporate network to evaluate which devices were operating in the environment. Given the following output:

CompTIA CS0-003 image Question 45 94666 10022024175105000000

Which of the following choices should the analyst look at first?

wh4dc-748gy.lan (192.168.86.152)
wh4dc-748gy.lan (192.168.86.152)
lan (192.168.86.22)
lan (192.168.86.22)
imaging.lan (192.168.86.150)
imaging.lan (192.168.86.150)
xlaptop.lan (192.168.86.249)
xlaptop.lan (192.168.86.249)
p4wnp1_aloa.lan (192.168.86.56)
p4wnp1_aloa.lan (192.168.86.56)
Suggested answer: E
Explanation:

The analyst should look at p4wnp1_aloa.lan (192.168.86.56) first, as this is the most suspicious device on the network. P4wnP1 ALOA is a tool that can be used to create a malicious USB device that can perform various attacks, such as keystroke injection, network sniffing, man-in-the-middle, or backdoor creation. The presence of a device with this name on the network could indicate that an attacker has plugged in a malicious USB device to a system and gained access to the network. Official

Reference: https://github.com/mame82/P4wnP1_aloa

asked 02/10/2024
Jason Smith
38 questions

Question 46

Report Export Collapse

When starting an investigation, which of the following must be done first?

Notify law enforcement
Notify law enforcement
Secure the scene
Secure the scene
Seize all related evidence
Seize all related evidence
Interview the witnesses
Interview the witnesses
Suggested answer: B
Explanation:

The first thing that must be done when starting an investigation is to secure the scene. Securing the scene involves isolating and protecting the area where the incident occurred, as well as any potential evidence or witnesses. Securing the scene can help prevent any tampering, contamination, or destruction of evidence, as well as any interference or obstruction of the investigation.

asked 02/10/2024
Kofi Amedorme
52 questions

Question 47

Report Export Collapse

Which of the following describes how a CSIRT lead determines who should be communicated with and when during a security incident?

The lead should review what is documented in the incident response policy or plan
The lead should review what is documented in the incident response policy or plan
Management level members of the CSIRT should make that decision
Management level members of the CSIRT should make that decision
The lead has the authority to decide who to communicate with at any t me
The lead has the authority to decide who to communicate with at any t me
Subject matter experts on the team should communicate with others within the specified area of expertise
Subject matter experts on the team should communicate with others within the specified area of expertise
Suggested answer: A
Explanation:

The incident response policy or plan is a document that defines the roles and responsibilities, procedures and processes, communication and escalation protocols, and reporting and documentation requirements for handling security incidents. The lead should review what is documented in the incident response policy or plan to determine who should be communicated with and when during a security incident, as well as what information should be shared and how. The incident response policy or plan should also be aligned with the organizational policies and legal obligations regarding incident notification and disclosure.

asked 02/10/2024
Louis Flink
38 questions

Question 48

Report Export Collapse

A new cybersecurity analyst is tasked with creating an executive briefing on possible threats to the organization. Which of the following will produce the data needed for the briefing?

Firewall logs
Firewall logs
Indicators of compromise
Indicators of compromise
Risk assessment
Risk assessment
Access control lists
Access control lists
Suggested answer: B
Explanation:

Indicators of compromise (IoCs) are pieces of data or evidence that suggest a system or network has been compromised by an attacker or malware. IoCs can include IP addresses, domain names, URLs, file hashes, registry keys, network traffic patterns, user behaviors, or system anomalies. IoCs can be used to detect, analyze, and respond to security incidents, as well as to share threat intelligence with other organizations or authorities. IoCs can produce the data needed for an executive briefing on possible threats to the organization, as they can provide information on the source, nature, scope, impact, and mitigation of the threats.

asked 02/10/2024
Website Subscription
44 questions

Question 49

Report Export Collapse

An analyst notices there is an internal device sending HTTPS traffic with additional characters in the header to a known-malicious IP in another country. Which of the following describes what the analyst has noticed?

Beaconing
Beaconing
Cross-site scripting
Cross-site scripting
Buffer overflow
Buffer overflow
PHP traversal
PHP traversal
Suggested answer: A
asked 02/10/2024
HAZEM SHAIKHANI
47 questions

Question 50

Report Export Collapse

A security analyst is reviewing a packet capture in Wireshark that contains an FTP session from a potentially compromised machine. The analyst sets the following display filter: ftp. The analyst can see there are several RETR requests with 226 Transfer complete responses, but the packet list pane is not showing the packets containing the file transfer itself. Which of the following can the analyst perform to see the entire contents of the downloaded files?

Change the display filter to f cp. accive. pore
Change the display filter to f cp. accive. pore
Change the display filter to tcg.port=20
Change the display filter to tcg.port=20
Change the display filter to f cp-daca and follow the TCP streams
Change the display filter to f cp-daca and follow the TCP streams
Navigate to the File menu and select FTP from the Export objects option
Navigate to the File menu and select FTP from the Export objects option
Suggested answer: C
Explanation:

The best way to see the entire contents of the downloaded files in Wireshark is to change the display filter to ftp-data and follow the TCP streams. FTP-data is a protocol that is used to transfer files between an FTP client and server using TCP port 20. By filtering for ftp-data packets and following the TCP streams, the analyst can see the actual file data that was transferred during the FTP session

asked 02/10/2024
Amar Lojo
41 questions
Total 437 questions
Go to page: of 44
Search

Related questions