A security analyst is reviewing the following log entries to identify anomalous activity:
Which of the following attack types is occurring?
Which of the following describes how a CSIRT lead determines who should be communicated with and when during a security incident?
Which of the following is an important aspect that should be included in the lessons-learned step after an incident?
An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server?
A technician working at company.com received the following email:
After looking at the above communication, which of the following should the technician recommend to the security team to prevent exposure of sensitive information and reduce the risk of corporate data being stored on non-corporate assets?
CompTIA CS0-003 Quiz:1 Topic:5 Questions:1-5
Free Practice Mock Questions Set 1-5 (Quiz # 1) for CompTIA CS0-003 Exam, according to official CompTIA Cybersecurity Analyst (CySA+) Exam syllabus topic # 5