Free CompTIA CS0-003 Exam Braindumps (page: 7)

93.3% Passing Rate DOWNLOAD PDF EXAM
473 Questions & Answers
Page 7 of 120

Which of the following security operations tasks are ideal for automation?


  1. Suspicious file analysis:
    Look for suspicious-looking graphics in a folder.
    Create subfolders in the original folder based on category of graphics found.
    Move the suspicious graphics to the appropriate subfolder

  2. Firewall IoC block actions:
    Examine the firewall logs for IoCs from the most recently published zero-day exploit
    Take mitigating actions in the firewall to block the behavior found in the logs
    Follow up on any false positives that were caused by the block rules

  3. Security application user errors:
    Search the error logs for signs of users having trouble with the security application
    Look up the user's phone number
    Call the user to help with any questions about using the application

  4. Email header analysis:
    Check the email header for a phishing confidence metric greater than or equal to five
    Add the domain of sender to the block list
    Move the email to quarantine

Answer(s): D



An organization has experienced a breach of customer transactions. Under the terms of PCI DSS, which of the following groups should the organization report the breach to?

  1. PCI Security Standards Council
  2. Local law enforcement
  3. Federal law enforcement
  4. Card issuer

Answer(s): D



Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?

  1. Mean time to detect
  2. Number of exploits by tactic
  3. Alert volume
  4. Quantity of intrusion attempts

Answer(s): A



A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment.
Which of the following implications should be considered on the new hybrid environment?

  1. The current scanners should be migrated to the cloud
  2. Cloud-specific misconfigurations may not be detected by the current scanners
  3. Existing vulnerability scanners cannot scan IaaS systems
  4. Vulnerability scans on cloud environments should be performed from the cloud

Answer(s): B






Post your Comments and Discuss CompTIA CS0-003 exam prep with other Community members:

CS0-003 Exam Discussions & Posts