ExamGecko
Home / CompTIA / CS0-003 / List of questions
Ask Question

CompTIA CS0-003 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers. Which of the following actions would allow the analyst to achieve the objective?

Upload the binary to an air gapped sandbox for analysis
Upload the binary to an air gapped sandbox for analysis
Send the binaries to the antivirus vendor
Send the binaries to the antivirus vendor
Execute the binaries on an environment with internet connectivity
Execute the binaries on an environment with internet connectivity
Query the file hashes using VirusTotal
Query the file hashes using VirusTotal
Suggested answer: A
Explanation:

The best action that would allow the analyst to gather intelligence without disclosing information to the attackers is to upload the binary to an air gapped sandbox for analysis. An air gapped sandbox is an isolated environment that has no connection to any external network or system. Uploading the binary to an air gapped sandbox can prevent any communication or interaction between the binary and the attackers, as well as any potential harm or infection to other systems or networks. An air gapped sandbox can also allow the analyst to safely analyze and observe the behavior, functionality, or characteristics of the binary.

asked 02/10/2024
SERGIO FREITAS
42 questions

Question 62

Report Export Collapse

Which of the following would help to minimize human engagement and aid in process improvement in security operations?

OSSTMM
OSSTMM
SIEM
SIEM
SOAR
SOAR
QVVASP
QVVASP
Suggested answer: C
Explanation:

SOAR stands for security orchestration, automation, and response, which is a term that describes a set of tools, technologies, or platforms that can help streamline, standardize, and automate security operations and incident response processes and tasks. SOAR can help minimize human engagement and aid in process improvement in security operations by reducing manual work, human errors, response time, or complexity. SOAR can also help enhance collaboration, coordination, efficiency, or effectiveness of security operations and incident response teams.

asked 02/10/2024
Jesserey Joseph
47 questions

Question 63

Report Export Collapse

After conducting a cybersecurity risk assessment for a new software request, a Chief Information Security Officer (CISO) decided the risk score would be too high. The CISO refused the software request. Which of the following risk management principles did the CISO select?

Avoid
Avoid
Transfer
Transfer
Accept
Accept
Mitigate
Mitigate
Suggested answer: A
Explanation:

Avoid is a risk management principle that describes the decision or action of not engaging in an activity or accepting a risk that is deemed too high or unacceptable. Avoiding a risk can eliminate the possibility or impact of the risk, as well as the need for any further risk management actions. In this case, the CISO decided the risk score would be too high and refused the software request. This indicates that the CISO selected the avoid principle for risk management.

asked 02/10/2024
Suraj Porwal
43 questions

Question 64

Report Export Collapse

Which of the following is an important aspect that should be included in the lessons-learned step after an incident?

Identify any improvements or changes in the incident response plan or procedures
Identify any improvements or changes in the incident response plan or procedures
Determine if an internal mistake was made and who did it so they do not repeat the error
Determine if an internal mistake was made and who did it so they do not repeat the error
Present all legal evidence collected and turn it over to iaw enforcement
Present all legal evidence collected and turn it over to iaw enforcement
Discuss the financial impact of the incident to determine if security controls are well spent
Discuss the financial impact of the incident to determine if security controls are well spent
Suggested answer: A
Explanation:

An important aspect that should be included in the lessons-learned step after an incident is to identify any improvements or changes in the incident response plan or procedures. The lessons-learned step is a process that involves reviewing and evaluating the incident response activities and outcomes, as well as identifying and documenting any strengths, weaknesses, gaps, or best practices. Identifying any improvements or changes in the incident response plan or procedures can help enhance the security posture, readiness, or capability of the organization for future incidents

asked 02/10/2024
MARCOS ALAMOS
41 questions

Question 65

Report Export Collapse

The security operations team is required to consolidate several threat intelligence feeds due to redundant tools and portals. Which of the following will best achieve the goal and maximize results?

Single pane of glass
Single pane of glass
Single sign-on
Single sign-on
Data enrichment
Data enrichment
Deduplication
Deduplication
Suggested answer: D
Explanation:

Deduplication is a process that involves removing any duplicate or redundant data or information from a data set or source. Deduplication can help consolidate several threat intelligence feeds by eliminating any overlapping or repeated indicators of compromise (IoCs), alerts, reports, or recommendations. Deduplication can also help reduce the volume and complexity of threat intelligence data, as well as improve its quality, accuracy, or relevance.

asked 02/10/2024
Marie Joyce Candice Dancel
45 questions

Question 66

Report Export Collapse

A user downloads software that contains malware onto a computer that eventually infects numerous other systems. Which of the following has the user become?

Hacklivist
Hacklivist
Advanced persistent threat
Advanced persistent threat
Insider threat
Insider threat
Script kiddie
Script kiddie
Suggested answer: C
Explanation:

The user has become an insider threat by downloading software that contains malware onto a computer that eventually infects numerous other systems. An insider threat is a person or entity that has legitimate access to an organization's systems, networks, or resources and uses that access to cause harm or damage to the organization. An insider threat can be intentional or unintentional, malicious or negligent, and can result from various actions or behaviors, such as downloading unauthorized software, violating security policies, stealing data, sabotaging systems, or collaborating with external attackers.

asked 02/10/2024
Ian Lloyd
42 questions

Question 67

Report Export Collapse

An organization has activated the CSIRT. A security analyst believes a single virtual server was compromised and immediately isolated from the network. Which of the following should the CSIRT conduct next?

Take a snapshot of the compromised server and verify its integrity
Take a snapshot of the compromised server and verify its integrity
Restore the affected server to remove any malware
Restore the affected server to remove any malware
Contact the appropriate government agency to investigate
Contact the appropriate government agency to investigate
Research the malware strain to perform attribution
Research the malware strain to perform attribution
Suggested answer: A
Explanation:

The next action that the CSIRT should conduct after isolating the compromised server from the network is to take a snapshot of the compromised server and verify its integrity. Taking a snapshot of the compromised server involves creating an exact copy or image of the server's data and state at a specific point in time. Verifying its integrity involves ensuring that the snapshot has not been altered, corrupted, or tampered with during or after its creation. Taking a snapshot and verifying its integrity can help preserve and protect any evidence or information related to the incident, as well as prevent any tampering, contamination, or destruction of evidence.

asked 02/10/2024
Jason Evans
53 questions

Question 68

Report Export Collapse

During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related to its volatility level?

Disk contents
Disk contents
Backup data
Backup data
Temporary files
Temporary files
Running processes
Running processes
Suggested answer: D
Explanation:

The most volatile type of evidence that must be collected first in a computer system is running processes. Running processes are programs or applications that are currently executing on a computer system and using its resources, such as memory, CPU, disk space, or network bandwidth. Running processes are very volatile because they can change rapidly or disappear completely when the system is shut down, rebooted, logged off, or crashed. Running processes can also be affected by other processes or users that may modify or terminate them. Therefore, running processes must be collected first before any other type of evidence in a computer system

asked 02/10/2024
Mark Lalangan
46 questions

Question 69

Report Export Collapse

A zero-day command injection vulnerability was published. A security administrator is analyzing the following logs for evidence of adversaries attempting to exploit the vulnerability:

Which of the following log entries provides evidence of the attempted exploit?

Log entry 1
Log entry 1
Log entry 2
Log entry 2
Log entry 3
Log entry 3
Log entry 4
Log entry 4
Suggested answer: D
Explanation:

Log entry 4 shows an attempt to exploit the zero-day command injection vulnerability by appending a malicious command (;cat /etc/passwd) to the end of a legitimate request (/cgi-bin/index.cgi?name=John). This command would try to read the contents of the/etc/passwdfile, which contains user account information, and could lead to further compromise of the system. The other log entries do not show any signs of command injection, as they do not contain any special characters or commands that could alter the intended behavior of the application. Official

Reference:

https://www.imperva.com/learn/application-security/command-injection/

https://www.zerodayinitiative.com/advisories/published/

asked 02/10/2024
J. Cuylits
37 questions

Question 70

Report Export Collapse

Which of the following is the most important factor to ensure accurate incident response reporting?

A well-defined timeline of the events
A well-defined timeline of the events
A guideline for regulatory reporting
A guideline for regulatory reporting
Logs from the impacted system
Logs from the impacted system
A well-developed executive summary
A well-developed executive summary
Suggested answer: A
Explanation:

A well-defined timeline of the events is the most important factor to ensure accurate incident response reporting, as it provides a clear and chronological account of what happened, when it happened, who was involved, and what actions were taken. A timeline helps to identify the root cause of the incident, the impact and scope of the damage, the effectiveness of the response, and the lessons learned for future improvement. A timeline also helps to communicate the incident to relevant stakeholders, such as management, legal, regulatory, or media entities. The other factors are also important for incident response reporting, but they are not as essential as a well-defined timeline. Official

Reference:

https://www.ibm.com/topics/incident-response

https://www.crowdstrike.com/cybersecurity-101/incident-response/incident-response-steps/

asked 02/10/2024
Yuri Shpovlov
47 questions
Total 431 questions
Go to page: of 44
Search

Related questions