Free CS0-003 Exam Braindumps

Pass your CompTIA CySA+ Certification Beta Exam exam with these free Questions and Answers

Page 10 of 30
QUESTION 41

A security analyst is performing vulnerability scans on the network. The analyst installs a scanner appliance, configures the subnets to scan, and begins the scan of the network. Which of the following
would be missing from a scan performed with this configuration?

  1. A. Operating system version
  2. B. Registry key values
  3. C. Open ports
  4. D. IP address

Correct Answer: B
Registry key values would be missing from a scan performed with this configuration, as the scanner appliance would not have access to the Windows Registry of the scanned systems. The Windows Registry is a database that stores configuration settings and options for the operating system and installed applications. To scan the Registry, the scanner would need to have credentials to log in to the systems and run a local agent or script. The other items would not be missing from the scan, as they can be detected by the scanner appliance without credentials. Operating system version can be identified by analyzing service banners or fingerprinting techniques. Open ports can be discovered by performing a port scan or sending probes to common ports. IP address can be obtained by resolving the hostname or using network discovery tools. https://attack.mitre.org/techniques/T1112/

QUESTION 42

A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers. Which of the following actions would allow the analyst to achieve the objective?

  1. A. Upload the binary to an air gapped sandbox for analysis
  2. B. Send the binaries to the antivirus vendor
  3. C. Execute the binaries on an environment with internet connectivity
  4. D. Query the file hashes using VirusTotal

Correct Answer: A
The best action that would allow the analyst to gather intelligence without disclosing information to the attackers is to upload the binary to an air gapped sandbox for analysis. An air gapped sandbox is an isolated environment that has no connection to any external network or system. Uploading the binary to an air gapped sandbox can prevent any communication or interaction between the binary and the attackers, as well as any potential harm or infection to other systems or networks. An air gapped sandbox can also allow the analyst to safely analyze and observe the behavior, functionality, or characteristics of the binary.

QUESTION 43

Which of the following best describes the goal of a disaster recovery exercise as preparation for possible incidents?

  1. A. TO provide metrics and test continuity controls
  2. B. To verify the roles of the incident response team
  3. C. To provide recommendations for handling vulnerabilities
  4. D. To perform tests against implemented security controls

Correct Answer: A
The correct answer is A. To provide metrics and test continuity controls.
A disaster recovery exercise is a simulation or a test of the disaster recovery plan, which is a set of procedures and resources that are used to restore the normal operations of an organization after a disaster or a major incident. The goal of a disaster recovery exercise is to provide metrics and test continuity controls, which are the measures that ensure the availability and resilience of the critical systems and processes of an organization. A disaster recovery exercise can help evaluate the effectiveness, efficiency, and readiness of the disaster recovery plan, as well as identify and address any gaps or issues .
The other options are not the best descriptions of the goal of a disaster recovery exercise. Verifying the roles of the incident response team (B) is a goal of an incident response exercise, which is a simulation or a test of the incident response plan, which is a set of procedures and roles that are used to detect, contain, analyze, and remediate an incident. Providing recommendations for handling vulnerabilities © is a goal of a vulnerability assessment, which is a process of identifying and prioritizing the weaknesses and risks in an organization’s systems or network. Performing tests against implemented security controls (D) is a goal of a penetration test, which is an authorized and simulated attack on an organization’s systems or network to evaluate their security posture and identify any vulnerabilities or misconfigurations.

QUESTION 44

Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in a secure environment?

  1. A. MOU
  2. B. NDA
  3. C. BIA
  4. D. SLA

Correct Answer: D
SLA stands for Service Level Agreement, which is a contract that defines the various levels of maintenance to be provided by an external business vendor in a secure environment. An SLA specifies the expectations, responsibilities, and obligations of both parties, such as the scope, quality, availability, and performance of the service, as well as the metrics and methods for measuring and reporting the service level. An SLA also outlines the penalties or remedies for any breach or failure of the service level. An SLA can help ensure that the external business vendor delivers the service in a timely, consistent, and secure manner, and that the customer receives the service that meets their needs and requirements. Official References:
CS0-003 dumps exhibit https://partners.comptia.org/docs/default-source/resources/comptia-cysa-cs0-002-exam-objectives
CS0-003 dumps exhibit https://www.comptia.org/certifications/cybersecurity-analyst
CS0-003 dumps exhibit https://www.comptia.org/blog/the-new-comptia-cybersecurity-analyst-your-questions-answered

QUESTION 45

Which of the following is the most important factor to ensure accurate incident response reporting?

  1. A. A well-defined timeline of the events
  2. B. A guideline for regulatory reporting
  3. C. Logs from the impacted system
  4. D. A well-developed executive summary

Correct Answer: A
A well-defined timeline of the events is the most important factor to ensure accurate incident response reporting, as it provides a clear and chronological account of what happened, when it happened, who was involved, and what actions were taken. A timeline helps to identify the root cause of the incident, the impact and scope of the damage, the effectiveness of the response, and the lessons learned for future improvement. A timeline also helps to communicate the incident to relevant stakeholders, such as management, legal, regulatory, or media entities. The other factors are also important for incident response reporting, but they are not as essential as a well-defined timeline. Official References:
CS0-003 dumps exhibit https://www.ibm.com/topics/incident-response
CS0-003 dumps exhibit https://www.crowdstrike.com/cybersecurity-101/incident-response/incident-response-steps/

Page 10 of 30

Post your Comments and Discuss CompTIA CS0-003 exam with other Community members: