최신 CS0-003 무료덤프 - CompTIA Cybersecurity Analyst (CySA+) Certification
A vulnerability scan shows the following issues:
Asset Type
CVSS Score
Exploit Vector
Workstations
6.5
RDP vulnerability
Storage Server
9.0
Unauthorized access due to server application vulnerability
Firewall
8.9
Default password vulnerability
Web Server
10.0
Zero-day vulnerability (vendor working on patch)
Which of the following actions should the security analyst take first?
Asset Type
CVSS Score
Exploit Vector
Workstations
6.5
RDP vulnerability
Storage Server
9.0
Unauthorized access due to server application vulnerability
Firewall
8.9
Default password vulnerability
Web Server
10.0
Zero-day vulnerability (vendor working on patch)
Which of the following actions should the security analyst take first?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following makes STIX and OpenloC information readable by both humans and machines?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst needs to provide evidence of regular vulnerability scanning on the company's network for an auditing process. Which of the following is an example of a tool that can produce such evidence?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An organization conducted a web application vulnerability assessment against the corporate website, and the following output was observed:

Which of the following tuning recommendations should the security analyst share?

Which of the following tuning recommendations should the security analyst share?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A Chief Information Security Officer wants to lock down the users' ability to change applications that are installed on their Windows systems. Which of the following is the best enterprise-level solution?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An attacker has just gained access to the syslog server on a LAN. Reviewing the syslog entries has allowed the attacker to prioritize possible next targets. Which of the following is this an example of?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A managed security service provider is having difficulty retaining talent due to an increasing workload caused by a client doubling the number of devices connected to the network. Which of the following would best aid in decreasing the workload without increasing staff?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An organization recently changed its BC and DR plans. Which of the following would best allow for the incident response team to test the changes without any impact to the business?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following risk management decisions should be considered after evaluating all other options?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An end-of-life date was announced for a widely used OS. A business-critical function is performed by some machinery that is controlled by a PC, which is utilizing the OS that is approaching the end-of- life date.
Which of the following best describes a security analyst's concern?
Which of the following best describes a security analyst's concern?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
An organization receives a legal hold request from an attorney. The request pertains to emails related to a disputed vendor contract. Which of the following is the first step for the security team to take to ensure compliance with the request?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is a nation-state actor least likely to be concerned with?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company's business type may be able to breach the network and remain inside of it for an extended period of time.
Which of the following techniques should be performed to meet the CISO's goals?
Which of the following techniques should be performed to meet the CISO's goals?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
An analyst receives threat intelligence regarding potential attacks from an actor with seemingly unlimited time and resources. Which of the following best describes the threat actor attributed to the malicious activity?
정답: C