An analyst notices there is an internal device sending HTTPS traffic with additional characters in the header to a known-malicious IP in another country. Which of the following describes what the analyst has noticed?
While reviewing web server logs, an analyst notices several entries with the same time stamps, but all contain odd characters in the request line. Which of the following steps should be taken next?
Determining what attack the odd characters are indicative of is the next step that should be taken after reviewing web server logs and noticing several entries with the same time stamps, but all contain odd characters in the request line. This step can help the analyst identify the type and severity of the attack, as well as the possible source and motive of the attacker. The odd characters in the request line may indicate that the attacker is trying to exploit a vulnerability or inject malicious code into the web server or application, such as SQL injection, cross-site scripting, buffer overflow, or command injection. The analyst can use tools and techniques such as log analysis, pattern matching, signature detection, or threat intelligence to determine what attack the odd characters are indicative of, and then proceed to the next steps of incident response, such as containment, eradication, recovery, and lessons learned. Official Reference:
https://partners.comptia.org/docs/default-source/resources/comptia-cysa-cs0-002-exam-objectives
https://www.comptia.org/certifications/cybersecurity-analyst
https://www.comptia.org/blog/the-new-comptia-cybersecurity-analyst-your-questions-answered
A cybersecurity team quarantines a virtual machine (VM) that has triggered alerts. However, this action does not stop the threat. Similar alerts are occurring for other VMs in the same broadcast domain. Which of the following steps in the incident response process should the team take next?
Comprehensive and Detailed Explanation From Exact Extract:
The scenario indicates the threat is still active and is appearing across multiple VMs in the same broadcast domain (suggesting lateral movement or propagation within that Layer 2 segment). Since quarantine of a single VM did not stop the threat, the appropriate next step is to broaden containment by isolating the affected subnet / network segment to prevent further spread.
The Sybex CySA+ Study Guide emphasizes that after identifying an incident in progress, responders should move into containment and that containment activities include segmentation and isolation:
Exact extract (Sybex Study Guide):
''After identifying a potential incident in progress, responders should take immediate action to contain the damage... Potential containment activities include network segmentation, isolation, and removal of affected systems.''
It also explains how segmentation (quarantine VLAN) is used to contain compromised systems and protect other systems:
Exact extract (Sybex Study Guide):
''During the early stages of an incident... [responders] built a separate virtual LAN (VLAN) to contain those systems... Putting the systems on this network segment provides some degree of isolation...''
Because the activity is occurring across the broadcast domain, isolating just one VM isn't enough; the team should continue containment by isolating the subnet/segment where the issue is spreading (Option D). Moving to eradication (Option C) before containment is effective risks continued spread and loss of control.
A vulnerability manager analyzes suspicious data after scanning a database. Which of the following should the manager do to prioritize the remediation tasks?
Comprehensive and Detailed Explanation From Exact Extract:
The key phrase is ''analyzes suspicious data after scanning''. Before you can prioritize remediation, you must first ensure the scan results are valid---i.e., determine whether the findings are true positives vs. false positives. That validation step is a core part of vulnerability management because it prevents wasting time remediating issues that do not actually exist and ensures your prioritization decisions are based on accurate findings.
The All-in-One CySA+ CS0-003 guide explicitly states that after receiving vulnerability scan data, the analyst's review process must focus on validating reported vulnerabilities (true/false positives). It also directly ties this to remediation/prioritization.
Exact extract (All-in-One Exam Guide):
''It is up to the analyst to review and make sense of vulnerability data and findings... The two most important outcomes of the review process are to determine the validity of reported vulnerabilities...''
It further emphasizes the importance of differentiating true positives from false positives for remediation and prioritization:
Exact extract (All-in-One Exam Guide):
''Distinguishing true positives from false positives... can be a tricky part of vulnerability remediation and prioritization.''
So, Option B (determine true/false positives) is the best action specifically to prioritize remediation tasks based on scan results.
Why the other options are not best:
A: Sending to IR may be appropriate if there is evidence of an active incident, but the question is framed as post-scan vulnerability management (not confirmed incident handling). Validation comes first.
C: Tickets and timeframes are important (often driven by SLAs/SLOs), but setting those correctly depends on confirming the findings are real and understanding severity/impact first.
D: Compensating controls and risk register entries are appropriate when remediation is not immediately feasible, but again you must confirm validity and then prioritize based on risk/impact.
Reference (CompTIA CySA+ CS0-003 documents / study guides used):
Mya Heath et al., CompTIA CySA+ All-in-One Exam Guide (CS0-003): validating vulnerability scan results; true/false positives; link to remediation prioritization
During a training exercise, a security analyst must determine the vulnerabilities to prioritize. The analyst reviews the following vulnerability scan output:

Which of the following issues should the analyst address first?
Allowing anonymous read access to /etc/passwd is a critical vulnerability because it can expose user account details, aiding attackers in password cracking and privilege escalation.
Option B (Anonymous FTP access) is a risk, but /etc/passwd exposure is more critical as it directly affects user authentication.
Option C (Defender updates disabled) is important, but it does not present an immediate attack vector like credential exposure.
Option D (less escape exploit) is significant, but it requires user interaction, making it less immediate than a global credential leak.
Thus, A is the correct answer, as it represents an immediate, high-impact security risk.
Vulnerability Management Garcia
10 days agoKevin Murphy
23 days agoMelissa Wright
14 days agoJason Wright
15 days agoStephanie Collins
4 days agoElizabeth Flores
17 days agoChanel
1 month agoColene
2 months agoJustine
2 months agoCarey
2 months agoMaurine
2 months agoErick
3 months agoMalinda
3 months agoReita
3 months agoPhyliss
4 months agoJaclyn
4 months agoMaurine
4 months agoHelene
4 months agoGeraldine
5 months agoMilly
5 months agoWilda
5 months agoMicheline
5 months agoAileen
5 months agoTeddy
6 months agoLuther
6 months agoJunita
6 months agoLazaro
6 months agoWava
7 months agoFreeman
7 months agoDominga
7 months agoLouvenia
8 months agoDelisa
8 months agoColby
8 months agoLeota
8 months agoHyman
8 months agoTheola
8 months agoArthur
10 months agoMa
10 months agoLashon
11 months agoSamira
11 months agoJoanna
11 months agoDelfina
1 year agoBilli
1 year agoRex
1 year agoKris
1 year agoDomitila
1 year agoJamal
1 year agoVivan
1 year agoMartina
1 year agoWerner
1 year agoLynelle
1 year agoMichal
1 year agoDesiree
1 year agoAnnamae
1 year agoValda
1 year agoMarshall
1 year agoKatheryn
1 year agoStanford
1 year agoLaurel
1 year agoPortia
1 year agoErin
1 year agoTamala
1 year agoEdison
2 years agoJohnetta
2 years agoCletus
2 years agoTheodora
2 years agoCora
2 years agoWillow
2 years agoRikki
2 years agoMelissa
2 years agoLavonna
2 years agoDerrick
2 years agoCristen
2 years agoHillary
2 years agoCasie
2 years agoArmando
2 years agoAshanti
2 years agoAileen
2 years agoAlberto
2 years agoNovella
2 years agoCarlee
2 years agoCristen
2 years agoBrandon
2 years agofelvaa
2 years agoalexa
2 years agoNathon
2 years agomelvin
2 years agoMark james
2 years agoAmmie
2 years ago