CS0-003試験無料問題集「CompTIA Cybersecurity Analyst (CySA+) Certification 認定」

Which of the following documents sets requirements and metrics for a third-party response during an event?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following stakeholders are most likely to receive a vulnerability scan report? (Select two).

解説: (GoShiken メンバーにのみ表示されます)
A security analyst is investigating an unusually high volume of requests received on a web server. Based on the following command and output:
access_log - [21/May/2024 13:19:06] "GET /newyddion HTTP/1.1" 404 -
access_log - [21/May/2024 13:19:06] "GET /1970 HTTP/1.1" 404 -
access_log - [21/May/2024 13:19:06] "GET /dopey HTTP/1.1" 404 -
...
Which of the following best describes the activity that the analyst will confirm?

解説: (GoShiken メンバーにのみ表示されます)
A vulnerability analyst received a list of system vulnerabilities and needs to evaluate the relevant impact of the exploits on the business. Given the constraints of the current sprint, only three can be remediated. Which of the following represents the least impactful risk, given the CVSS3.1 base scores?

解説: (GoShiken メンバーにのみ表示されます)
Several reports with sensitive information are being disclosed via file sharing services. The company would like to improve its security posture against this threat. Which of the following security controls would best support the company in this scenario?

解説: (GoShiken メンバーにのみ表示されます)
A vulnerability management team is unable to patch all vulnerabilities found during their weekly scans. Using the third-party scoring system described below, the team patches the most urgent vulnerabilities:

Additionally, the vulnerability management team feels that the metrics Smear and Channing are less important than the others, so these will be lower in priority. Which of the following vulnerabilities should be patched first, given the above third-party scoring system?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is the most important factor to ensure accurate incident response reporting?

解説: (GoShiken メンバーにのみ表示されます)
After an upgrade to a new EDR, a security analyst received reports that several endpoints were not communicating with the SaaS provider to receive critical threat signatures. To comply with the incident response playbook, the security analyst was required to validate connectivity to ensure communications. The security analyst ran a command that provided the following output:
* ComputerName: comptia007
* RemotePort: 443
* InterfaceAlias: Ethernet 3
* TcpTestSucceeded: False
Which of the following did the analyst use to ensure connectivity?

解説: (GoShiken メンバーにのみ表示されます)
Numerous emails were sent to a company's customer distribution list. The customers reported that the emails contained a suspicious link. The company's SOC determined the links were malicious. Which of the following is the best way to decrease these emails?

解説: (GoShiken メンバーにのみ表示されます)
An analyst is reviewing a dashboard from the company's SIEM and finds that an IP address known to be malicious can be tracked to numerous high-priority events in the last two hours. The dashboard indicates that these events relate to TTPs. Which of the following is the analyst most likely using?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is the best framework for assessing how attackers use techniques over an infrastructure to exploit a target's information assets?

解説: (GoShiken メンバーにのみ表示されます)
A security analyst is reviewing a recent vulnerability scan report for a new server infrastructure. The analyst would like to make the best use of time by resolving the most critical vulnerability first. The following information is provided:

Which of the following should the analyst concentrate remediation efforts on first?

解説: (GoShiken メンバーにのみ表示されます)
An organization recently changed its BC and DR plans. Which of the following would best allow for the incident response team to test the changes without any impact to the business?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following phases of the Cyber Kill Chain involves the adversary attempting to establish communication with a successfully exploited target?

解説: (GoShiken メンバーにのみ表示されます)
An analyst investigated a website and produced the following:
Which of the following syntaxes did the analyst use to discover the application versions on this vulnerable website?

A cybersecurity analyst is doing triage in a SIEM and notices that the time stamps between the firewall and the host under investigation are off by 43 minutes. Which of the following is the most likely scenario occurring with the time stamps?

解説: (GoShiken メンバーにのみ表示されます)