Free Certification Practice Questions

COMPTIA-CYSA

Loading…
CompTIA's CS0-003 Which of the following stakeholders are most likely to receive a vulnerability scan report? (Choose two.) E. Product owner F. Systems administration
#211
CompTIA's CS0-003 Which of the following techniques can help a SOC team to reduce the number of alerts related to the internal security activities that the analysts have to triage?
#212
CompTIA's CS0-003 An analyst is evaluating a vulnerability management dashboard. The analyst sees that a previously remediated vulnerability has reappeared on a database server. Which of the following is the most likely cause?
#213
CompTIA's CS0-003 A company has decided to expose several systems to the internet. The systems are currently available internally only. A security analyst is using a subset of CVSS3.1 exploitability metrics to prioritize the vulnerabilities that would be the most exploitable when the systems are exposed to the internet. The systems and the vulnerabilities are shown below:Which of the following systems should be prioritized for patching?
#214
CompTIA's CS0-003 During an incident in which a user machine was compromised, an analyst recovered a binary file that potentially caused the exploitation. Which of the following techniques could be used for further analysis?
#215
CompTIA's CS0-003 A leader on the vulnerability management team is trying to reduce the team's workload by automating some simple but time-consuming tasks. Which of the following activities should the team leader consider first?
#216
CompTIA's CS0-003 The Chief Information Security Officer (CISO) of a large management firm has selected a cybersecurity framework that will help the organization demonstrate its investment in tools and systems to protect its data. Which of the following did the CISO most likely select?
#217
CompTIA's CS0-003 A high volume of failed RDP authentication attempts was logged on a critical server within a one-hour period. All of the attempts originated from the same remote IP address and made use of a single valid domain user account. Which of the following would be the most effective mitigating control to reduce the rate of success of this brute-force attack?
#218
CompTIA's CS0-003 An incident response analyst is investigating the root cause of a recent malware outbreak. Initial binary analysis indicates that this malware disables host security services and performs cleanup routines on its infected hosts, including deletion of initial dropper and removal of event log entries and prefetch files from the host. Which of the following data sources would most likely reveal evidence of the root cause? (Choose two.) E. File system metadata F. Sysmon event log
#219
CompTIA's CS0-003 When undertaking a cloud migration of multiple SaaS applications, an organization's systems administrators struggled with the complexity of extending identity and access management to cloud-based assets. Which of the following service models would have reduced the complexity of this project?
#220
CompTIA's CS0-003 A security analyst reviews the following extract of a vulnerability scan that was performed against the web server:Which of the following recommendations should the security analyst provide to harden the web server?
#221
CompTIA's CS0-003 A security analyst is responding to an incident that involves a malicious attack on a network data closet. Which of the following best explains how the analyst should properly document the incident?
#222
CompTIA's CS0-003 A cybersecurity analyst is participating with the DLP project team to classify the organization's data. Which of the following is the primary purpose for classifying data?
#223
CompTIA's CS0-003 A security analyst observed the following activity from a privileged account:• Accessing emails and sensitive information• Audit logs being modified• Abnormal log-in timesWhich of the following best describes the observed activity?
#224
CompTIA's CS0-003 A vulnerability management team found four major vulnerabilities during an assessment and needs to provide a report for the proper prioritization for further mitigation. Which of the following vulnerabilities should have the highest priority for the mitigation process?
#225
CompTIA's CS0-003 A security analyst received an alert regarding multiple successful MFA log-ins for a particular user. When reviewing the authentication logs, the analyst sees the following:Which of the following are most likely occurring, base on the MFA logs? (Choose two.) E. Rogue access point F. Password spray
#226
CompTIA's CS0-003 A security analyst has identified a new malware file that has impacted the organization. The malware is polymorphic and has built-in conditional triggers that require a connection to the internet. The CPU has an idle process of at least 70%. Which of the following best describes how the security analyst can effectively review the malware without compromising the organization’s network?
#227
CompTIA's CS0-003 Which of the following threat-modeling procedures is in the OWASP Web Security Testing Guide?
#228
CompTIA's CS0-003 Which of the following would an organization use to develop a business continuity plan?
#229
CompTIA's CS0-003 The management team requests monthly KPI reports on the company’s cybersecurity program. Which of the following KPIs would identify how long a security threat goes unnoticed in the environment?
#230
CompTIA's CS0-003 Which of the following best describes the key elements of a successful information security program?
#231
CompTIA's CS0-003 A systems administrator notices unfamiliar directory names on a production server. The administrator reviews the directory listings and files, and then concludes the server has been compromised. Which of the following steps should the administrator take next?
#232
CompTIA's CS0-003 Which of the following is a nation-state actor least likely to be concerned with?
#233
CompTIA's CS0-003 Which of the following is a commonly used four-component framework to communicate threat actor behavior?
#234
CompTIA's CS0-003 An employee downloads a freeware program to change the desktop to the classic look of legacy Windows. Shortly after the employee installs the program, a high volume of random DNS queries begin to originate from the system. An investigation on the system reveals the following:Add-MpPreference –ExclusionPath ‘%Program Files%\ksyconfig’Which of the following is possibly occurring?
#235
CompTIA's CS0-003 An organization discovered a data breach that resulted in PII being released to the public. During the lessons learned review, the panel identified discrepancies regarding who was responsible for external reporting, as well as the timing requirements. Which of the following actions would best address the reporting issue?
#236
CompTIA's CS0-003 During an incident, a security analyst discovers a large amount of PII has been emailed externally from an employee to a public email address. The analyst finds that the external email is the employee’s personal email. Which of the following should the analyst recommend be done first?
#237
CompTIA's CS0-003 Which of the following can be used to learn more about TTPs used by cybercriminals?
#238
CompTIA's CS0-003 Which of the following statements best describes the MITRE ATT&CK framework? E. It breaks down intrusions into a clearly defined sequence of phases.
#239
CompTIA's CS0-003 A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company’s business type may be able to breach the network and remain inside of it for an extended period of time. Which of the following techniques should be performed to meet the CISO’s goals?
#240