최신 CS0-003 무료덤프 - CompTIA Cybersecurity Analyst (CySA+) Certification
Which of the following BEST describes HSM?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst discovers suspicious host activity while performing monitoring activities. The analyst pulls a packet capture for the activity and sees the following:
Follow TCP stream:
Which of the following describes what has occurred?
Follow TCP stream:
Which of the following describes what has occurred?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the following is the best step to preserve evidence?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An analyst is reviewing system logs while threat hunting:
Which of the following hosts should be investigated first?
Which of the following hosts should be investigated first?
정답: B
The Chief Information Security Officer is directing a new program to reduce attack surface risks and threats as part of a zero trust approach. The IT security team is required to come up with priorities for the program. Which of the following is the best priority based on common attack frameworks?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst at a company called ACME Commercial notices there is outbound traffic to a host IP that resolves to https://office365password.acme.co. The site's standard VPN logon page is www.acme.com/logon. Which of the following is most likely true?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
An analyst is remediating items associated with a recent incident. The analyst has isolated the vulnerability and is actively removing it from the system. Which of the following steps of the process does this describe?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is a difference between SOAR and SCAP?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An XSS vulnerability was reported on one of the public websites of a company. The security department confirmed the finding and needs to provide a recommendation to the application owner. Which of the following recommendations will best prevent this vulnerability from being exploited? (Choose two.)
정답: C,F
설명: (DumpTOP 회원만 볼 수 있음)
After identifying a threat, a company has decided to implement a patch management program to remediate vulnerabilities. Which of the following risk management principles is the company exercising?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
After conducting a cybersecurity risk assessment for a new software request, a Chief Information Security Officer (CISO) decided the risk score would be too high. The CISO refused the software request. Which of the following risk management principles did the CISO select?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An organization's internal department frequently uses a cloud provider to store large amounts of sensitive data. A threat actor has deployed a virtual machine to attack another virtual machine to gain access to the data. Through the use of the cloud host's hypervisor, the threat actor has escalated the access rights. Which of the following actions would be BEST to remediate the vulnerability the attacker has used to exploit the system?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
An analyst is evaluating a vulnerability management dashboard. The analyst sees that a previously remediated vulnerability has reappeared on a database server. Which of the following is the most likely cause?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)