Free Certification Practice Questions

COMPTIA-CYSA

Loading…
CompTIA's CS0-003 A vulnerability scanner generates the following output:The company has an SLA for patching that requires time frames to be met for high-risk vulnerabilities. Which of the following should the analyst prioritize first for remediation?
#151
CompTIA's CS0-003 A web application team notifies a SOC analyst that there are thousands of HTTP/404 events on the public-facing web server. Which of the following is the next step for the analyst to take?
#152
CompTIA's CS0-003 Which of the following best describes the reporting metric that should be utilized when measuring the degree to which a system application, or user base is affected by an uptime availability outage?
#153
CompTIA's CS0-003 A security analyst needs to provide evidence of regular vulnerability scanning on the company's network for an auditing process. Which of the following is an example of a tool that can produce such evidence?
#154
CompTIA's CS0-003 A security analyst performs a vulnerability scan. Based on the metrics from the scan results, the analyst must prioritize which hosts to patch. The analyst runs the tool and receives the following output:Which of the following hosts should be patched first, based on the metrics?
#155
CompTIA's CS0-003 An organization receives a legal hold request from an attorney. The request pertains to emails related to a disputed vendor contract. Which of the following is the best step for the security team to take to ensure compliance with the request?
#156
CompTIA's CS0-003 A company has the following security requirements:• No public IPs• All data secured at rest• No insecure ports/protocolsAfter a cloud scan is completed a security analyst receives reports that several misconfigurations are putting the company at risk. Given the following cloud scanner output:Which of the following should the analyst recommend be updated first to meet the security requirements and reduce risks?
#157
CompTIA's CS0-003 Which of the following best describes the actions taken by an organization after the resolution of an incident that addresses issues and reflects on the growth opportunities for future incidents?
#158
CompTIA's CS0-003 An analyst is becoming overwhelmed with the number of events that need to be investigated for a timeline. Which of the following should the analyst focus on in order to move the incident forward?
#159
CompTIA's CS0-003 To minimize the impact of a security incident, a cybersecurity analyst has configured audit settings in the organization’s cloud services. Which of the following security controls has the analyst configured?
#160
CompTIA's CS0-003 A web developer reports the following error that appeared on a development server when testing a new application:Which of the following tools can be used to identify the application’s point of failure?
#161
CompTIA's CS0-003 Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in a secure environment?
#162
CompTIA's CS0-003 A security team is concerned about recent Layer 4 DDoS attacks against the company website. Which of the following controls would best mitigate the attacks?
#163
CompTIA's CS0-003 An analyst is reviewing system logs while threat hunting:Which of the following hosts should be investigated first? E. PC5
#164
CompTIA's CS0-003 An organization needs to bring in data collection and aggregation from various endpoints. Which of the following is the best tool to deploy to help analysts gather this data?
#165
CompTIA's CS0-003 A regulated organization experienced a security breach that exposed a list of customer names with corresponding PII data. Which of the following is the best reason for developing the organization's communication plans?
#166
CompTIA's CS0-003 Following an incident, a security analyst needs to create a script for downloading the configuration of all assets from the cloud tenancy. Which of the following authentication methods should the analyst use?
#167
CompTIA's CS0-003 A penetration tester is conducting a test on an organization's software development website. The penetration tester sends the following request to the web interface:Which of the following exploits is most likely being attempted?
#168
CompTIA's CS0-003 A manufacturer has hired a third-party consultant to assess the security of an OT network that includes both fragile and legacy equipment. Which of the following must be considered to ensure the consultant does no harm to operations?
#169
CompTIA's CS0-003 A team of analysts is developing a new internal system that correlates information from a variety of sources, analyzes that information, and then triggers notifications according to company policy. Which of the following technologies was deployed?
#170
CompTIA's CS0-003 Which of following would best mitigate the effects of a new ransomware attack that was not properly stopped by the company antivirus?
#171
CompTIA's CS0-003 A Chief Information Security Officer wants to implement security by design, starting with the implementation of a security scanning method to identify vulnerabilities, including SQL injection, RFI, XSS, etc. Which of the following would most likely meet the requirement?
#172
CompTIA's CS0-003 A security analyst scans a host and generates the following output:Which of the following best describes the output?
#173
CompTIA's CS0-003 The security team at a company, which was a recent target of ransomware, compiled a list of hosts that were identified as impacted and in scope for this incident. Based on the following host list:Which of the following systems was most pivotal to the threat actor in its distribution of the encryption binary via Group Policy? E. HQAdmin9
#174
CompTIA's CS0-003 After a security assessment was done by a third-party consulting firm, the cybersecurity program recommended integrating DLP and CASE to reduce analyst alert fatigue. Which of the following is the best possible outcome that this effort hopes to achieve?
#175
CompTIA's CS0-003 Which of the following threat actors is most likely to target a company due to its questionable environmental policies?
#176
CompTIA's CS0-003 A cybersecurity analyst is recording the following details:• ID• Name• Description• Classification of information• Responsible partyIn which of the following documents is the analyst recording this information?
#177
CompTIA's CS0-003 A SOC manager is establishing a reporting process to manage vulnerabilities. Which of the following would be the best solution to identify potential loss incurred by an issue?
#178
CompTIA's CS0-003 While configuring a SIEM for an organization, a security analyst is having difficulty correlating incidents across different systems. Which of the following should be checked first?
#179
CompTIA's CS0-003 During a scan of a web server in the perimeter network, a vulnerability was identified that could be exploited over port 3389. The web server is protected by a WAF. Which of the following best represents the change to overall risk associated with this vulnerability?
#180