ExamGecko
Home Home / CompTIA / CS0-003

CompTIA CS0-003 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers. Which of the following actions would allow the analyst to achieve the objective?

A.
Upload the binary to an air gapped sandbox for analysis
A.
Upload the binary to an air gapped sandbox for analysis
Answers
B.
Send the binaries to the antivirus vendor
B.
Send the binaries to the antivirus vendor
Answers
C.
Execute the binaries on an environment with internet connectivity
C.
Execute the binaries on an environment with internet connectivity
Answers
D.
Query the file hashes using VirusTotal
D.
Query the file hashes using VirusTotal
Answers
Suggested answer: A

Explanation:

The best action that would allow the analyst to gather intelligence without disclosing information to the attackers is to upload the binary to an air gapped sandbox for analysis. An air gapped sandbox is an isolated environment that has no connection to any external network or system. Uploading the binary to an air gapped sandbox can prevent any communication or interaction between the binary and the attackers, as well as any potential harm or infection to other systems or networks. An air gapped sandbox can also allow the analyst to safely analyze and observe the behavior, functionality, or characteristics of the binary.

Which of the following would help to minimize human engagement and aid in process improvement in security operations?

A.
OSSTMM
A.
OSSTMM
Answers
B.
SIEM
B.
SIEM
Answers
C.
SOAR
C.
SOAR
Answers
D.
QVVASP
D.
QVVASP
Answers
Suggested answer: C

Explanation:

SOAR stands for security orchestration, automation, and response, which is a term that describes a set of tools, technologies, or platforms that can help streamline, standardize, and automate security operations and incident response processes and tasks. SOAR can help minimize human engagement and aid in process improvement in security operations by reducing manual work, human errors, response time, or complexity. SOAR can also help enhance collaboration, coordination, efficiency, or effectiveness of security operations and incident response teams.

After conducting a cybersecurity risk assessment for a new software request, a Chief Information Security Officer (CISO) decided the risk score would be too high. The CISO refused the software request. Which of the following risk management principles did the CISO select?

A.
Avoid
A.
Avoid
Answers
B.
Transfer
B.
Transfer
Answers
C.
Accept
C.
Accept
Answers
D.
Mitigate
D.
Mitigate
Answers
Suggested answer: A

Explanation:

Avoid is a risk management principle that describes the decision or action of not engaging in an activity or accepting a risk that is deemed too high or unacceptable. Avoiding a risk can eliminate the possibility or impact of the risk, as well as the need for any further risk management actions. In this case, the CISO decided the risk score would be too high and refused the software request. This indicates that the CISO selected the avoid principle for risk management.

Which of the following is an important aspect that should be included in the lessons-learned step after an incident?

A.
Identify any improvements or changes in the incident response plan or procedures
A.
Identify any improvements or changes in the incident response plan or procedures
Answers
B.
Determine if an internal mistake was made and who did it so they do not repeat the error
B.
Determine if an internal mistake was made and who did it so they do not repeat the error
Answers
C.
Present all legal evidence collected and turn it over to iaw enforcement
C.
Present all legal evidence collected and turn it over to iaw enforcement
Answers
D.
Discuss the financial impact of the incident to determine if security controls are well spent
D.
Discuss the financial impact of the incident to determine if security controls are well spent
Answers
Suggested answer: A

Explanation:

An important aspect that should be included in the lessons-learned step after an incident is to identify any improvements or changes in the incident response plan or procedures. The lessons-learned step is a process that involves reviewing and evaluating the incident response activities and outcomes, as well as identifying and documenting any strengths, weaknesses, gaps, or best practices. Identifying any improvements or changes in the incident response plan or procedures can help enhance the security posture, readiness, or capability of the organization for future incidents

The security operations team is required to consolidate several threat intelligence feeds due to redundant tools and portals. Which of the following will best achieve the goal and maximize results?

A.
Single pane of glass
A.
Single pane of glass
Answers
B.
Single sign-on
B.
Single sign-on
Answers
C.
Data enrichment
C.
Data enrichment
Answers
D.
Deduplication
D.
Deduplication
Answers
Suggested answer: D

Explanation:

Deduplication is a process that involves removing any duplicate or redundant data or information from a data set or source. Deduplication can help consolidate several threat intelligence feeds by eliminating any overlapping or repeated indicators of compromise (IoCs), alerts, reports, or recommendations. Deduplication can also help reduce the volume and complexity of threat intelligence data, as well as improve its quality, accuracy, or relevance.

A user downloads software that contains malware onto a computer that eventually infects numerous other systems. Which of the following has the user become?

A.
Hacklivist
A.
Hacklivist
Answers
B.
Advanced persistent threat
B.
Advanced persistent threat
Answers
C.
Insider threat
C.
Insider threat
Answers
D.
Script kiddie
D.
Script kiddie
Answers
Suggested answer: C

Explanation:

The user has become an insider threat by downloading software that contains malware onto a computer that eventually infects numerous other systems. An insider threat is a person or entity that has legitimate access to an organization's systems, networks, or resources and uses that access to cause harm or damage to the organization. An insider threat can be intentional or unintentional, malicious or negligent, and can result from various actions or behaviors, such as downloading unauthorized software, violating security policies, stealing data, sabotaging systems, or collaborating with external attackers.

An organization has activated the CSIRT. A security analyst believes a single virtual server was compromised and immediately isolated from the network. Which of the following should the CSIRT conduct next?

A.
Take a snapshot of the compromised server and verify its integrity
A.
Take a snapshot of the compromised server and verify its integrity
Answers
B.
Restore the affected server to remove any malware
B.
Restore the affected server to remove any malware
Answers
C.
Contact the appropriate government agency to investigate
C.
Contact the appropriate government agency to investigate
Answers
D.
Research the malware strain to perform attribution
D.
Research the malware strain to perform attribution
Answers
Suggested answer: A

Explanation:

The next action that the CSIRT should conduct after isolating the compromised server from the network is to take a snapshot of the compromised server and verify its integrity. Taking a snapshot of the compromised server involves creating an exact copy or image of the server's data and state at a specific point in time. Verifying its integrity involves ensuring that the snapshot has not been altered, corrupted, or tampered with during or after its creation. Taking a snapshot and verifying its integrity can help preserve and protect any evidence or information related to the incident, as well as prevent any tampering, contamination, or destruction of evidence.

During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related to its volatility level?

A.
Disk contents
A.
Disk contents
Answers
B.
Backup data
B.
Backup data
Answers
C.
Temporary files
C.
Temporary files
Answers
D.
Running processes
D.
Running processes
Answers
Suggested answer: D

Explanation:

The most volatile type of evidence that must be collected first in a computer system is running processes. Running processes are programs or applications that are currently executing on a computer system and using its resources, such as memory, CPU, disk space, or network bandwidth. Running processes are very volatile because they can change rapidly or disappear completely when the system is shut down, rebooted, logged off, or crashed. Running processes can also be affected by other processes or users that may modify or terminate them. Therefore, running processes must be collected first before any other type of evidence in a computer system

A zero-day command injection vulnerability was published. A security administrator is analyzing the following logs for evidence of adversaries attempting to exploit the vulnerability:

Which of the following log entries provides evidence of the attempted exploit?

A.
Log entry 1
A.
Log entry 1
Answers
B.
Log entry 2
B.
Log entry 2
Answers
C.
Log entry 3
C.
Log entry 3
Answers
D.
Log entry 4
D.
Log entry 4
Answers
Suggested answer: D

Explanation:

Log entry 4 shows an attempt to exploit the zero-day command injection vulnerability by appending a malicious command (;cat /etc/passwd) to the end of a legitimate request (/cgi-bin/index.cgi?name=John). This command would try to read the contents of the/etc/passwdfile, which contains user account information, and could lead to further compromise of the system. The other log entries do not show any signs of command injection, as they do not contain any special characters or commands that could alter the intended behavior of the application. Official

Reference:

https://www.imperva.com/learn/application-security/command-injection/

https://www.zerodayinitiative.com/advisories/published/

Which of the following is the most important factor to ensure accurate incident response reporting?

A.
A well-defined timeline of the events
A.
A well-defined timeline of the events
Answers
B.
A guideline for regulatory reporting
B.
A guideline for regulatory reporting
Answers
C.
Logs from the impacted system
C.
Logs from the impacted system
Answers
D.
A well-developed executive summary
D.
A well-developed executive summary
Answers
Suggested answer: A

Explanation:

A well-defined timeline of the events is the most important factor to ensure accurate incident response reporting, as it provides a clear and chronological account of what happened, when it happened, who was involved, and what actions were taken. A timeline helps to identify the root cause of the incident, the impact and scope of the damage, the effectiveness of the response, and the lessons learned for future improvement. A timeline also helps to communicate the incident to relevant stakeholders, such as management, legal, regulatory, or media entities. The other factors are also important for incident response reporting, but they are not as essential as a well-defined timeline. Official

Reference:

https://www.ibm.com/topics/incident-response

https://www.crowdstrike.com/cybersecurity-101/incident-response/incident-response-steps/

Total 368 questions
Go to page: of 37