CompTIA's CS0-003 A newly hired security manager in a SOC wants to improve efficiency by automating routine tasks. Which of the following SOC tasks is most suitable for automation?
#331
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 Which of the following is a circumstance in which a security operations manager would most likely consider using automation?
#332
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 A network security analyst for a large company noticed unusual network activity on a critical system. Which of the following tools should the analyst use to analyze network traffic to search for malicious activity?
#333
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 A system that provides the user interface for a critical server has potentially been corrupted by malware. Which of the following is the best recommendation to ensure business continuity?
#334
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 Which of following attack methodology frameworks should a cybersecurity analyst use to identify similar TTPs utilized by nation-state actors?
#335
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 During a training exercise, a security analyst must determine the vulnerabilities to prioritize. The analyst reviews the following vulnerability scan output:Which of the following issues should the analyst address first?
#336
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 An analyst is trying to capture anomalous traffic from a compromised host. Which of the following are the best tools for achieving this objective? (Choose two.) E. Nmap F. SOAR
#337
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 An XSS vulnerability was reported on one of the public websites of a company. The security department confirmed the finding and needs to provide a recommendation to the application owner. Which of the following recommendations will best prevent this vulnerability from being exploited? (Choose two.) E. Configure TLS v1.3 on the website. F. Fix the vulnerability using a virtual patch at the WAF.
#338
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 Executives want to compare certain metrics from the most recent and last reporting periods to determine whether the metrics are increasing or decreasing. Which of the following would provide the necessary information to satisfy this request?
#339
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 A security analyst is reviewing a recent vulnerability scan report for a new server infrastructure. The analyst would like to make the best use of time by resolving the most critical vulnerability first. The following information is provided:Which of the following should the analyst concentrate remediation efforts on first?
#340
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 A SOC manager reviews metrics from the last four weeks to investigate a recurring availability issue. The manager finds similar events correlating to the times of the reported issues. Which of the following methods would the manager most likely use to resolve the issue?
#341
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 A security analyst must assist the IT department with creating a phased plan for vulnerability patching that meets established SLAs. Which of the following vulnerability management elements will best assist with prioritizing a successful plan?
#342
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 A Chief Information Security Officer has requested a dashboard to share critical vulnerability management goals with company leadership. Which of the following would be the best to include in the dashboard?
#343
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 Numerous emails were sent to a company’s customer distribution list. The customers reported that the emails contained a suspicious link. The company’s SOC determined the links were malicious. Which of the following is the best way to decrease these emails?
#344
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 A security analyst is conducting a vulnerability assessment of a company’s online store. The analyst discovers a critical vulnerability in the payment processing system that could be exploited, allowing attackers to steal customer payment information. Which of the following should the analyst do next?
#345
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 Results of a SOC customer service evaluation indicate high levels of dissatisfaction with the inconsistent services provided after regular work hours. To address this, the SOC lead drafts a document establishing customer expectations regarding the SOC’s performance and quality of services. Which of the following documents most likely fits this description?
#346
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 A systems administrator needs to gather security events with repeatable patterns from Linux log files. Which of the following would the administrator most likely use for this task?
#347
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 An analyst is reviewing a dashboard from the company’s SIEM and finds that an IP address known to be malicious can be tracked to numerous high-priority events in the last two hours. The dashboard indicates that these events relate to TTPs. Which of the following is the analyst most likely using?
#348
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 Which of the following is most appropriate to use with SOAR when the security team would like to automate actions across different vendor platforms?
#349
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 Thousands of computers were compromised in a breach, but the vulnerability that caused the compromise was detected on only three computers during the latest vulnerability scan. An analyst conducts an after action review to determine why the vulnerability was not detected on more computers. The analyst recreates the following configuration that was used to scan the network:Which of the following best explains the reason the vulnerability was found only on three computers?
#350
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 A security analyst needs to develop a solution to protect a high-value asset from an exploit like a recent zero-day attack. Which of the following best describes this risk management strategy?
#351
Answer: D✅ Correct❌ Incorrect
CompTIA's CS0-003 An organization identifies a method to detect unexpected behavior, crashes, or resource leaks in a system by feeding invalid, unexpected, or random data to stress the application. Which of the following best describes this testing methodology?
#352
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 A WAF weekly report shows that a daily spike occurs from the same subnet. An open-source review indicates the IP addresses belong to a legitimate internet service provider but have been flagged for DDoS attacks and reconnaissance scanning in the past year. Which of the following actions should a SOC analyst take first in response to these traffic uptick activities?
#353
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 In the last hour, a high volume of failed RDP authentication attempts has been logged on a critical server. All of the authentication attempts originated from the same remote IP address and made use of a single valid domain user account. Which of the following mitigating controls would be most effective to reduce the rate of success of this brute-force attack? (Choose two.) E. Install a third-party remote access tool and disable RDP on all devices. F. Block inbound to TCP port 3389 from untrusted remote IP addresses at the perimeter firewall.
#354
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 A Chief Information Security Officer (CISO) has decided the cost to protect an asset is greater than the cost of losing the asset. Which of the following risk management principles is the CISO following?
#355
Answer: A✅ Correct❌ Incorrect
CompTIA's CS0-003 After an upgrade to a new EDR, a security analyst received reports that several endpoints were not communicating with the SaaS provider to receive critical threat signatures. To comply with the incident response playbook, the security analyst was required to validate connectivity to ensure communications. The security analyst ran a command that provided the following:ComputerName: comptia007 -RemotePort: 443 -InterfaceAlias: Ethernet 3 -TopTestSucceeded: False -Which of the following did the analyst use to ensure connectivity?
#356
Answer: B✅ Correct❌ Incorrect
CompTIA's CS0-003 A company was able to reduce triage time by focusing on historical trend analysis. The business partnered with the security team to achieve a 50% reduction in phishing attempts year over year. Which of the following action plans led to this reduced triage time?
#357
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 A security audit for unsecured network services was conducted, and the following output was generated:Which of the following services should the security team investigate further? (Choose two.) E. 1723 F. 3389
#358
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 Several incidents have occurred with a legacy web application that has had little development work completed. Which of the following is the most likely cause of the incidents?
#359
Answer: C✅ Correct❌ Incorrect
CompTIA's CS0-003 An incident response team is assessing attack vectors of malware that is encrypting data with ransomware. There are no indications of a network-based intrusion. Which of the following is the most likely root cause of the incident?