Win IT Exam with Last Dumps 2024

CompTIA CS0-002 Exam

Page 10/10
Viewing Questions 91 96 out of 96 Questions

Question 91
The incident response team is working with a third-party forensic specialist to investigate the root cause of a recent intrusion. An analyst was asked to submit sensitive network design details for review. The forensic specialist recommended electronic delivery for efficiency, but email was not an approved communication channel to send network details. Which of the following BEST explains the importance of using a secure method of communication during incident response?

Question 92
According to a static analysis report for a web application, a dynamic code evaluation script injection vulnerability was found. Which of the following actions is theBEST option to fix the vulnerability in the source code?

Question 93
A security analyst has discovered malware is spreading across multiple critical systems and is originating from a single workstation, which belongs to a member of the cyberinfrastructure team who has legitimate administrator credentials. An analysis of the traffic indicates the workstation swept the network looking for vulnerable hosts to infect. Which of the following would have worked BEST to prevent the spread of this infection?

Question 94
Which of the following BEST identifies the appropriate use of threat intelligence as a function of detection and response?

Question 95
A security analyst on the threat-hunting team has developed a list of unneeded, benign services that are currently running as part of the standard OS deployment for workstations. The analyst will provide this list to the operations team to create a policy that will automatically disable the services for all workstations in the organization. Which of the following BEST describes the security analyst's goal?

Question 96
A cybersecurity analyst is supporting an incident response effort via threat intelligence. Which of the following is the analyst MOST likely executing?