Free Certification Practice Questions

COMPTIA-CYSA

Loading…
CompTIA's CS0-003 A security analyst observes a high volume of SYN flags from an unexpected source toward a web application server within one hour. The traffic is not flagging for any exploit signatures.Which of the following scenarios best describes this activity?
#391
CompTIA's CS0-003 Which of the following features is a key component of Zero Trust architecture? E. Internal auditing process
#392
CompTIA's CS0-003 An organization wants to establish a disaster recovery plan for critical applications that are hosted on premises. Which of the following is the first step to prepare for supporting this new requirement?
#393
CompTIA's CS0-003 A junior security analyst opened ports on the company’s firewall, and the company experienced a data breach. Which of the following most likely caused the data breach?
#394
CompTIA's CS0-003 When undertaking a cloud migration of multiple SaaS applications, an organization’s systems administrators struggled with the complexity of extending identity and access management to cloud-based assets. Which of the following service models would have reduced the complexity of this project?
#395
CompTIA's CS0-003 An analyst produces a weekly endpoint status report for the management team. The report Includes specific details for each endpoint in relation to organizational baselines. Which of the following best describes the report type?
#396
CompTIA's CS0-003 A user is suspected of violating policy by logging in to a Linux VM during non-business hours. Which of the following system files is the best way to track the user’s activities?
#397
CompTIA's CS0-003 A user’s computer is performing slower than the day before, and unexpected windows continually open and close. The user did not install any new programs, and after the user restarted the desktop, the issue was not resolved. Which of the following incident response actions should be taken next?
#398
CompTIA's CS0-003 Which of the following risk management decisions should be considered after evaluating all other options?
#399
CompTIA's CS0-003 A security analyst finds an application that cannot enforce the organization’s password policy. An exception is granted. As a compensating control, all users must confirm that their passwords comply with the organization’s policy. Which of the following types of compensating controls is the organization using?
#400
CompTIA's CS0-003 A company has recently experienced a security breach via a public-facing service. Analysis of the event on the server was traced back to the following piece of code:SELECT * From user_data WHERE Username = 0 and userid= 1 or 1=1;--Which of the following controls would be best to implement?
#401
CompTIA's CS0-003 A security analyst provides the management team with an after action report for a security incident. Which of the following is the management team most likely to review in order to correct validated issues with the incident response processes?
#402
CompTIA's CS0-003 A security analyst needs to prioritize vulnerabilities for patching. Given the following vulnerability and system information:Which of the following systems should the analyst patch? E. 5 F. 6
#403
CompTIA's CS0-003 During a packet capture review, a security analyst identifies the output below as suspicious:Which of the following best describes the type of activity the analyst has identified?
#404
CompTIA's CS0-003 An organization performs software assurance activities and reviews some web framework code that uses exploitable jquery modules. Which of the following tools or techniques should the organization use to help identify these issues?
#405
CompTIA's CS0-003 An organization has implemented code into a production environment. During a routine test, a penetration tester found that some of the code had a backdoor implemented causing a developer to make changes outside of the change management windows. Which of the following is the best way to prevent this issue?
#406
CompTIA's CS0-003 An analyst reviews the following web server log entries:%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/etc/passwdNo attacks or malicious attempts have been discovered. Which of the following most likely describes what took place?
#407
CompTIA's CS0-003 An organization is preparing for a disaster recovery exercise. Which of the following actions should be implemented first?
#408
CompTIA's CS0-003 A third-party assessment of a recent incident determined that the incident response team spent too long trying to get the scope needed for the incident timeline and too much time was spent searching for false positives. Which of the following should the team work on first?
#409
CompTIA's CS0-003 A security analyst is developing a script to filter firewall vulnerabilities. The script will impact the integrity of data hosted on devices connected to networks. Which of the following is a CVSS v4.0 that the analyst can use to test a true positive for the script?
#410
CompTIA's CS0-003 An analyst wants to detect outdated software packages on a server. Which of the following methodologies will achieve this objective?
#411
CompTIA's CS0-003 A systems administrator receives several reports about emails containing phishing links. The hosting domain is always different, but the URL follows a specific pattern of characters.Which of the following is the best way for the administrator to find more messages that were not reported?
#412
CompTIA's CS0-003 A security analyst receives an alert with the following packet capture attached:Which of the following has occurred?
#413
CompTIA's CS0-003 A company runs a website that allows public posts. Recently, some users report that when visiting the website, pop-ups appear asking the users for their credentials.Which of the following is the most likely cause of this issue?
#414
CompTIA's CS0-003 A security manager has decided to form a special group of analysts who participate in both penetration testing and defending the company's network infrastructure during exercises.Which of the following teams should the group form in order to achieve this goal?
#415
CompTIA's CS0-003 Which of the following documents should link to the recovery point objectives and recovery time objectives on critical services?
#416
CompTIA's CS0-003 An e-commerce organization recently experienced a cyberattack. During a lessons learned meeting, a cybersecurity analyst requests that the RTO is prioritized. Which of the following is the greatest concern?
#417
CompTIA's CS0-003 A security analyst reviews a SIEM alert related to a suspicious email and wants to verify the authenticity of the message:SPF = PASS -DKIM = FAIL -DMARC = FAIL -Which of the following did the analyst most likely discover?
#418
CompTIA's CS0-003 An IDS is triggered during after-hours operations. The indicator records an abnormal amount of SYN requests being sent to port 21 from numerous external systems. A security analyst reports this information to the IR team for further investigation. Which of the following best describes this incident?
#419
CompTIA's CS0-003 While performing a dynamic analysis of a malicious file, a security analyst notices the memory address changes every time the process runs. Which of the following controls is most likely preventing the analyst from finding the proper memory address of the piece of malicious code?
#420