최신 CS0-003 무료덤프 - CompTIA Cybersecurity Analyst (CySA+) Certification
An employee received a phishing email that contained malware targeting the company. Which of the following is the best way for a security analyst to get more details about the malware and avoid disclosing information?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An analyst notices there is an internal device sending HTTPS traffic with additional characters in the header to a known-malicious IP in another country. Which of the following describes what the analyst has noticed?
정답: C
When starting an investigation, which of the following must be done first?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst has received an incident case regarding malware spreading out of control on a customer's network. The analyst is unsure how to respond. The configured EDR has automatically obtained a sample of the malware and its signature. Which of the following should the analyst perform next to determine the type of malware, based on its telemetry?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is a reason why proper handling and reporting of existing evidence are important for the investigation and reporting phases of an incident response?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
An analyst is suddenly unable to enrich data from the firewall. However, the other open intelligence feeds continue to work. Which of the following is the most likely reason the firewall feed stopped working?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A Chief Information Security Officer wants to lock down the users' ability to change applications that are installed on their Windows systems. Which of the following is the best enterprise-level solution?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An analyst is reviewing a dashboard from the company's SIEM and finds that an IP address known to be malicious can be tracked to numerous high-priority events in the last two hours. The dashboard indicates that these events relate to TTPs. Which of the following is the analyst most likely using?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following concepts is using an API to insert bulk access requests from a file into an identity management system an example of?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An incident response team finished responding to a significant security incident. The management team has asked the lead analyst to provide an after-action report that includes lessons learned. Which of the following is the most likely reason to include lessons learned?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst recently used Arachni to perform a vulnerability assessment of a newly developed web application. The analyst is concerned about the following output:
[+] XSS: In form input 'txtSearch' with action https://localhost/search.aspx
[-] XSS: Analyzing response #1...
[-] XSS: Analyzing response #2...
[-] XSS: Analyzing response #3...
[+] XSS: Response is tainted. Looking for proof of the vulnerability.
Which of the following is the most likely reason for this vulnerability?
[+] XSS: In form input 'txtSearch' with action https://localhost/search.aspx
[-] XSS: Analyzing response #1...
[-] XSS: Analyzing response #2...
[-] XSS: Analyzing response #3...
[+] XSS: Response is tainted. Looking for proof of the vulnerability.
Which of the following is the most likely reason for this vulnerability?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A technician identifies a vulnerability on a server and applies a software patch. Which of the following should be the next step in the remediation process?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following best describes the reporting metric that should be utilized when measuring the degree to which a system, application, or user base is affected by an uptime availability outage?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A security administrator needs to import Pll data records from the production environment to the test environment for testing purposes. Which of the following would best protect data confidentiality?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A company has a primary control in place to restrict access to a sensitive database. However, the company discovered an authentication vulnerability that could bypass this control. Which of the following is the best compensating control?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A manufacturer has hired a third-party consultant to assess the security of an OT network that includes both fragile and legacy equipment Which of the following must be considered to ensure the consultant does no harm to operations?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst needs to mitigate a known, exploited vulnerability related not tack vector that embeds software through the USB interface. Which of the following should the analyst do first?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
During an incident, a security analyst discovers a large amount of Pll has been emailed externally from an employee to a public email address. The analyst finds that the external email is the employee's personal email. Which of the following should the analyst recommend be done first?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)