CompTIA's CS0-003 A recent zero-day vulnerability is being actively exploited, requires no user interaction or privilege escalation, and has a significant impact to confidentiality and integrity but not to availability. Which of the following CVE metrics would be most accurate for this zero-day threat?
#1
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 Which of the following tools would work best to prevent the exposure of PII outside of an organization?
#2
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 An organization conducted a web application vulnerability assessment against the corporate website, and the following output was observed:Which of the following tuning recommendations should the security analyst share?
#3
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 Which of the following items should be included in a vulnerability scan report? (Choose two.) E. Risk score F. Education plan
#4
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 The Chief Executive Officer of an organization recently heard that exploitation of new attacks in the industry was happening approximately 45 days after a patch was released. Which of the following would best protect this organization?
#5
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 A security analyst recently joined the team and is trying to determine which scripting language is being used in a production script to determine if it is malicious. Given the following script:Which of the following scripting languages was used in the script?
#6
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 A company's user accounts have been compromised. Users are also reporting that the company's internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS. Which of the following most likely describes the observed activity?
#7
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 A security analyst is tasked with prioritizing vulnerabilities for remediation. The relevant company security policies are shown below:Security Policy 1006: Vulnerability Management1. The Company shall use the CVSSv3.1 Base Score Metrics (Exploitability and Impact) to prioritize the remediation of security vulnerabilities.2. In situations where a choice must be made between confidentiality and availability, the Company shall prioritize confidentiality of data over availability of systems and data.3. The Company shall prioritize patching of publicly available systems and services over patching of internally available system.According to the security policy, which of the following vulnerabilities should be the highest priority to patch?
#8
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 Which of the following will most likely ensure that mission-critical services are available in the event of an incident?
#9
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 The Chief Information Security Officer wants to eliminate and reduce shadow IT in the enterprise. Several high-risk cloud applications are used that increase the risk to the organization. Which of the following solutions will assist in reducing the risk?
#10
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 An incident response team receives an alert to start an investigation of an internet outage. The outage is preventing all users in multiple locations from accessing external SaaS resources. The team determines the organization was impacted by a DDoS attack. Which of the following logs should the team review first?
#11
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attack. Which of the following best describes the current stage of the Cyber Kill Chain that the threat actor is currently operating in?
#12
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 An analyst finds that an IP address outside of the company network that is being used to run network and vulnerability scans across external-facing assets. Which of the following steps of an attack framework is the analyst witnessing?
#13
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 An incident response analyst notices multiple emails traversing the network that target only the administrators of the company. The email contains a concealed URL that leads to an unknown website in another country. Which of the following best describes what is happening? (Choose two.) E. Obfuscated links F. Address Resolution Protocol poisoning
#14
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?
#15
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 An analyst is reviewing a vulnerability report and must make recommendations to the executive team. The analyst finds that most systems can be upgraded with a reboot resulting in a single downtime window. However, two of the critical systems cannot be upgraded due to a vendor appliance that the company does not have access to. Which of the following inhibitors to remediation do these systems and associated vulnerabilities best represent?
#16
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 The security team reviews a web server for XSS and runs the following Nmap scan:Which of the following most accurately describes the result of the scan?
#17
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?
#18
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?
#19
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server? E. Static IP address
#20
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 Which of the following security operations tasks are ideal for automation?
#21
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 An organization has experienced a breach of customer transactions. Under the terms of PCI DSS, which of the following groups should the organization report the breach to?
#22
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?
#23
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the following implications should be considered on the new hybrid environment?
#24
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a terminable offense, the SOC analyst collects the authentication logs, web logs, and temporary files, reflecting the web searches from the user's workstation, to build the case for the investigation. Which of the following is the best way to ensure that the investigation complies with HR or privacy policies?
#25
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 Which of the following is the first step that should be performed when establishing a disaster recovery plan?
#26
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 A technician identifies a vulnerability on a server and applies a software patch. Which of the following should be the next step in the remediation process?
#27
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 The analyst reviews the following endpoint log entry:Which of the following has occurred?
#28
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?
#29
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 When starting an investigation, which of the following must be done first?