CS0-003 (THREEPEAT) Flashcards
A recent zero-day vulnerability is being actively exploited, requires no user interaction or privilege escalation, and has a significant impact to confidentiality and integrity but not to availability. Which of the following CVE metrics would be most accurate for this zero-day threat?
A. CVSS:31/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:K/A:L
B. CVSS:31/AV:K/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
C. CVSS:31/AV:N/AC:L/PR:N/UI:H/S:U/C:L/I:N/A:H
D. CVSS:31/AV:L/AC:L/PR:R/UI:R/S:U/C:H/I:L/A:H
Correct Answer: A
A. CVSS:31/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:K/A:L
Attack Vector (AV): Network (AV:N)
Attack Complexity (AC): Low (AC:L)
Privileges Required (PR): None (PR:N)
User Interaction (UI): None (UI:N)
Scope (S): Unchanged (S:U)
Confidentiality Impact ©: High (C:H)
Integrity Impact (I): Known (I:K)
Availability Impact (A): Low (A:L)
B. CVSS:31/AV:K/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
Attack Vector (AV): Adjacent Network (AV:K)
Attack Complexity (AC): Low (AC:L)
Privileges Required (PR): High (PR:H)
User Interaction (UI): Required (UI:R)
Scope (S): Changed (S:C)
Confidentiality Impact ©: High (C:H)
Integrity Impact (I): High (I:H)
Availability Impact (A): Low (A:L)
C. CVSS:31/AV:N/AC:L/PR:N/UI:H/S:U/C:L/I:N/A:H
Attack Vector (AV): Network (AV:N)
Attack Complexity (AC): Low (AC:L)
Privileges Required (PR): None (PR:N)
User Interaction (UI): Required (UI:H)
Scope (S): Unchanged (S:U)
Confidentiality Impact ©: Low (C:L)
Integrity Impact (I): None (I:N)
Availability Impact (A): High (A:H)
D. CVSS:31/AV:L/AC:L/PR:R/UI:R/S:U/C:H/I:L/A:H
Attack Vector (AV): Local (AV:L)
Attack Complexity (AC): Low (AC:L)
Privileges Required (PR): Required (PR:R)
User Interaction (UI): Required (UI:R)
Scope (S): Unchanged (S:U)
Confidentiality Impact ©: High (C:H)
Integrity Impact (I): Low (I:L)
Availability Impact (A): High (A:H)
These vectors provide information about the severity of security vulnerabilities. They consider factors like attack vectors, complexity, privileges required, user interaction, and impact on confidentiality, integrity, and availability. If you have any specific questions about these vectors or need further clarification, feel free to ask! 😊
Which of the following tools would work best to prevent the exposure of PII outside of an organization?
A. PAM
B. IDS
C. PKI
D. DLP
Correct Answer: D
The best tool for preventing the exposure of Personally Identifiable Information (PII) outside of an organization is DLP (Data Loss Prevention).
DLP solutions help monitor, detect, and prevent sensitive data from being leaked or transmitted to unauthorized recipients. They can enforce policies to safeguard PII, such as credit card numbers, Social Security numbers, and other confidential information.
IDS (Intrusion Detection System) detects network threats.
PKI (Public Key Infrastructure) manages digital certificates for secure communication.
PAM (Privileged Access Management) focuses on controlling access to critical systems and accounts.
Which of the following items should be included in a vulnerability scan report? (Choose two.)
A. Lessons learned
B. Service-level agreement
C. Playbook
D. Affected hosts
E. Risk score
F. Education plan
Correct Answer: D, E
D. Affected hosts: Definitely! This information helps pinpoint where vulnerabilities exist.
E. Risk score: Yes, including the risk score provides context on the severity of each vulnerability.
Items like “Lessons learned,” “Service-level agreement,” “Playbook,” and “Education plan” are not typically part of a vulnerability scan report. They might be relevant for other security documentation but aren’t directly related to scan results.
The Chief Executive Officer of an organization recently heard that exploitation of new attacks in the industry was happening approximately 45 days after a patch was released. Which of the following would best protect this organization?
A. A mean time to remediate of 30 days
B. A mean time to detect of 45 days
C. A mean time to respond of 15 days
D. Third-party application testing
Correct Answer: A
Response - Incident response activities include detection, analysis, containment, eradication, recovery, communication, and documentation.
Remediation - Remediation activities include applying patches, fixing misconfigurations, updating security policies, improving access controls, and implementing other corrective measures.
A company’s user accounts have been compromised. Users are also reporting that the company’s internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS. Which of the following most likely describes the observed activity?
A. There is an issue with the SSL certificate causing port 443 to become unavailable for HTTPS access
B. An on-path attack is being performed by someone with internal access that forces users into port 80
C. The web server cannot handle an increasing amount of HTTPS requests so it forwards users to port 80
D. An error was caused by BGP due to new rules applied over the company’s internal routers
Correct Answer: B
Based on the information provided, it seems that option B is the most likely scenario.
An on-path attack by an internal actor could be forcing users to connect via port 80 (HTTP) instead of port 443 (HTTPS). This manipulation could compromise security by intercepting or redirecting traffic. It’s essential for the company to investigate further and take appropriate measures to secure their network and user accounts.
A security analyst is tasked with prioritizing vulnerabilities for remediation. The relevant company security policies are shown below:
Security Policy 1006: Vulnerability Management
- The Company shall use the CVSSv3.1 Base Score Metrics (Exploitability and Impact) to prioritize the remediation of security vulnerabilities.
- In situations where a choice must be made between confidentiality and availability, the Company shall prioritize confidentiality of data over availability of systems and data.
- The Company shall prioritize patching of publicly available systems and services over patching of internally available system.
According to the security policy, which of the following vulnerabilities should be the highest priority to patch?
A. Name: THOR.HAMMER -
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Internal System
B. Name: CAP.SHIELD -
CVSS 3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
External System
C. Name: LOKI.DAGGER -
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
External System
D. Name: THANOS.GAUNTLET -
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Internal System
Correct Answer: B
CAP.SHIELD
Based on the security policy’s criteria, vulnerabilities B (CAP.SHIELD) and D (THANOS.GAUNTLET) have the highest priority in patching because they have the highest impact on confidentiality, which takes precedence over availability.
B. CAP.SHIELD - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (External System)
Exploitability: Low
Impact: High (Confidentiality)
Patching Priority: Highest
D. THANOS.GAUNTLET - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (Internal System)
Exploitability: Low
Impact: High (Confidentiality)
Patching Priority: Highest
According to the policy, external systems should be prioritized over internal systems.
Therefore, vulnerability B should be addressed first.
Which of the following will most likely ensure that mission-critical services are available in the event of an incident?
A. Business continuity plan
B. Vulnerability management plan
C. Disaster recovery plan
D. Asset management plan
Correct Answer: A
The goal of the business continuity program is to ensure that the organization is able to
maintain normal operations even during an unexpected event. When an incident strikes,
business continuity controls may protect the business’ core functions from disruption.
The goal of the disaster recovery program is to help the organization quickly recover
normal operations if they are disrupted. An incident may cause service disruptions that
would trigger the disaster recovery plan.
The Chief Information Security Officer wants to eliminate and reduce shadow IT in the enterprise. Several high-risk cloud applications are used that increase the risk to the organization. Which of the following solutions will assist in reducing the risk?
A. Deploy a CASB and enable policy enforcement
B. Configure MFA with strict access
C. Deploy an API gateway
D. Enable SSO to the cloud applications
Correct Answer: A
Deploy a CASB and enable policy enforcement (Option A): A Cloud Access Security Broker (CASB) acts as an intermediary between users and cloud services. It provides visibility into cloud usage, enforces security policies, and helps prevent unauthorized access. By deploying a CASB and enforcing policies, you can gain better control over cloud applications and reduce the risk associated with shadow IT.
An incident response team receives an alert to start an investigation of an internet outage. The outage is preventing all users in multiple locations from accessing external SaaS resources. The team determines the organization was impacted by a DDoS attack. Which of the following logs should the team review first?
A. CDN
B. Vulnerability scanner
C. DNS
D. Web server
Correct Answer: C
Given that the organization was impacted by a DDoS attack, the team should review the DNS logs first. DNS (Domain Name System) logs can provide valuable information about the domain resolution process, including any unusual or malicious requests. Analyzing DNS logs can help identify patterns associated with the attack and provide insights into the source of the traffic. Once the DNS logs have been reviewed, the team can proceed to examine other relevant logs, such as web server logs or CDN logs, to further investigate the incident.
A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attack. Which of the following best describes the current stage of the Cyber Kill Chain that the threat actor is currently operating in?
A. Weaponization
B. Reconnaissance
C. Delivery
D. Exploitation
Correct Answer: D
The current stage of the Cyber Kill Chain that the threat actor is operating in is D. Exploitation. At this stage, the attacker has successfully exploited a vulnerability or weakness to gain unauthorized access to the network. Their goal is to maintain access and continue their attack.
An analyst finds that an IP address outside of the company network that is being used to run network and vulnerability scans across external-facing assets. Which of the following steps of an attack framework is the analyst witnessing?
A. Exploitation
B. Reconnaissance
C. Command and control
D. Actions on objectives
Correct Answer: B
The analyst is witnessing the reconnaissance phase. During this stage, attackers gather information about their target, which often includes scanning external-facing assets to identify vulnerabilities. It’s a critical step before launching an attack.
An incident response analyst notices multiple emails traversing the network that target only the administrators of the company. The email contains a concealed URL that leads to an unknown website in another country. Which of the following best describes what is happening? (Choose two.)
A. Beaconing
B. Domain Name System hijacking
C. Social engineering attack
D. On-path attack
E. Obfuscated links
F. Address Resolution Protocol poisoning
Correct Answer: C, E
- Social Engineering Attack (C): This seems likely. Targeting only administrators with a concealed URL could be an attempt to manipulate them into clicking the link, potentially compromising their credentials or installing malicious software.
- Obfuscated Links (E): Concealing the URL suggests obfuscation. Cybercriminals often use obfuscated links to evade detection by security tools and trick users into visiting malicious sites.
The other options are less relevant in this context. Beaconing (A) typically refers to a compromised system communicating with a command-and-control server. Domain Name System (DNS) hijacking (B) involves redirecting DNS queries to malicious servers. On-path attacks (D) and Address Resolution Protocol (ARP) poisoning (F) are less likely explanations for this scenario.
Remember to investigate further and take appropriate action to protect your network. If you need additional assistance, feel free to ask!
During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?
A. Conduct regular red team exercises over the application in production
B. Ensure that all implemented coding libraries are regularly checked
C. Use application security scanning as part of the pipeline for the CI/CD flow
D. Implement proper input validation for any data entry form
Correct Answer: C
To mitigate recurring vulnerabilities in a critical application throughout the software development lifecycle (SDLC), Use application security scanning as part of the pipeline for the CI/CD flow.
Here’s why:
Continuous Integration/Continuous Deployment (CI/CD): Integrating security scanning into the CI/CD pipeline ensures that security checks are performed automatically during each stage of development, from code commits to deployment. This approach catches vulnerabilities early and prevents them from propagating to production.
Automation: By automating security scans, you reduce the reliance on manual testing, which can be error-prone and time-consuming. Automated scans can identify common vulnerabilities (such as injection flaws, cross-site scripting, and insecure configurations) consistently and efficiently.
Shift Left: Incorporating security scanning early in the SDLC (the “shift left” approach) allows developers to address vulnerabilities during coding and testing phases. This proactive approach prevents issues from reaching production.
While options A, B, and D are also important, they address different aspects of security:
A (Red Team Exercises): Useful for assessing overall security posture but not necessarily for identifying specific recurring vulnerabilities.
B (Checking Coding Libraries): Important for maintaining library hygiene but doesn’t directly address the recurring vulnerabilities.
D (Input Validation): Essential for preventing specific types of vulnerabilities (e.g., injection attacks), but it’s not a comprehensive solution for all recurring issues.
An analyst is reviewing a vulnerability report and must make recommendations to the executive team. The analyst finds that most systems can be upgraded with a reboot resulting in a single downtime window. However, two of the critical systems cannot be upgraded due to a vendor appliance that the company does not have access to. Which of the following inhibitors to remediation do these systems and associated vulnerabilities best represent?
A. Proprietary systems
B. Legacy systems
C. Unsupported operating systems
D. Lack of maintenance windows
Correct Answer: A
The systems that cannot be upgraded due to a vendor appliance represent proprietary systems. These appliances are likely tightly integrated with the critical systems, making it difficult to apply updates or patches.
Unlike legacy systems, which are older but still supported, proprietary systems often lack the flexibility to accommodate standard upgrades.
Unsupported operating systems, on the other hand, refer to those that no longer receive security updates from their vendors.
The issue here seems to be the proprietary nature of the vendor appliance, hindering the necessary upgrades.
Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?
A. Develop a call tree to inform impacted users
B. Schedule a review with all teams to discuss what occurred
C. Create an executive summary to update company leadership
D. Review regulatory compliance with public relations for official notification
Correct Answer: B
Conducting a thorough review involving all relevant teams allows for knowledge sharing, identification of gaps, and process improvements. It promotes collaboration and learning from the incident.
A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?
A. Code analysis
B. Static analysis
C. Reverse engineering
D. Fuzzing
Correct Answer: B
Given the scenario, static analysis is often the first step. It allows the analyst to identify suspicious patterns, check for hardcoded credentials, and understand the binary’s behavior without executing it. If further investigation is needed, reverse engineering becomes valuable.
An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server?
A. Hard disk
B. Primary boot partition
C. Malicious files
D. Routing table
E. Static IP address
Correct Answer: D
When preserving sensitive information before isolating a server, the routing table (option D) should be collected first. The routing table contains critical network configuration details, which can help identify potential attack vectors and compromised routes. By capturing this information early, the incident response team can ensure that essential data is preserved for further analysis.
Which of the following security operations tasks are ideal for automation?
A. Suspicious file analysis:
Look for suspicious-looking graphics in a folder. Create subfolders in the original folder based on category of graphics found. Move the suspicious graphics to the appropriate subfolder
B. Firewall IoC block actions:
Examine the firewall logs for IoCs from the most recently published zero-day exploit. Take mitigating actions in the firewall to block the behavior found in the logs. Follow up on any false positives that were caused by the block rules
C. Security application user errors:
Search the error logs for signs of users having trouble with the security application. Look up the user’s phone number - Call the user to help with any questions about using the application
D. Email header analysis:
Check the email header for a phishing confidence metric greater than or equal to five. Add the domain of sender to the block list. Move the email to quarantine
Correct Answer: B
Analyzing firewall logs for Indicators of Compromise (IoCs) is a common security task. Automation can efficiently process large log volumes, identify patterns, and trigger blocking rules.
Automation feasibility: Highly feasible (commonly automated).
D could end up adding common email domains to the block list and limit communication that is unintended.
An organization has experienced a breach of customer transactions. Under the terms of PCI DSS, which of the following groups should the organization report the breach to?
A. PCI Security Standards Council
B. Local law enforcement
C. Federal law enforcement
D. Card issuer
Correct Answer: D
Under the terms of the Payment Card Industry Data Security Standard (PCI DSS), an organization that experiences a breach of customer transactions should report the breach to the card issuer.
The card issuer is responsible for handling the incident and notifying the appropriate parties, including law enforcement if necessary.
The other options—such as the PCI Security Standards Council, local law enforcement, and federal law enforcement—may also be involved in the investigation, but the primary reporting responsibility lies with the card issuer.
Which of the following is the best metric for an organization to focus on given recent investments in SIEM, SOAR, and a ticketing system?
A. Mean time to detect
B. Number of exploits by tactic
C. Alert volume
D. Quantity of intrusion attempts
Correct Answer: A
Given the recent investments in SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), and a ticketing system, the best metric for an organization to focus on would be the mean time to detect (MTTD).
MTTD measures the average time it takes to identify and respond to security incidents. A shorter MTTD indicates a more efficient detection and response process, which is crucial for minimizing the impact of security threats.
While other metrics (such as alert volume, quantity of intrusion attempts, and number of exploits by tactic) provide valuable insights, MTTD directly reflects the effectiveness of the security infrastructure and processes. It helps organizations assess their ability to detect and mitigate threats promptly.
A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the following implications should be considered on the new hybrid environment?
A. The current scanners should be migrated to the cloud
B. Cloud-specific misconfigurations may not be detected by the current scanners
C. Existing vulnerability scanners cannot scan IaaS systems
D. Vulnerability scans on cloud environments should be performed from the cloud
Correct Answer: B
Cloud-Specific Misconfigurations: Traditional vulnerability scanners may not fully detect cloud-specific misconfigurations. Cloud environments have unique security challenges, such as misconfigured permissions, network settings, and storage access. Ensure your vulnerability management tools account for these cloud-specific issues.
Migration of Scanners: While migrating your current scanners to the cloud (Option A) is an option, it’s essential to evaluate whether they are optimized for cloud environments. Some scanners may need adjustments or replacements to effectively scan cloud resources.
Vulnerability Scans from the Cloud: Performing vulnerability scans directly from the cloud (Option D) is recommended. This approach ensures that scans originate within the same environment, providing accurate results and minimizing network latency.
Coverage for IaaS Systems: Existing vulnerability scanners can indeed scan IaaS systems (Option C).
However, ensure they are configured correctly to assess cloud-based infrastructure. Consider integrating cloud-native security tools for comprehensive coverage.
A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a terminable offense, the SOC analyst collects the authentication logs, web logs, and temporary files, reflecting the web searches from the user’s workstation, to build the case for the investigation. Which of the following is the best way to ensure that the investigation complies with HR or privacy policies?
A. Create a timeline of events detailing the date stamps, user account hostname and IP information associated with the activities
B. Ensure that the case details do not reflect any user-identifiable information Password protect the evidence and restrict access to personnel related to the investigation
C. Create a code name for the investigation in the ticketing system so that all personnel with access will not be able to easily identify the case as an HR-related investigation
D. Notify the SOC manager for awareness after confirmation that the activity was intentional
Correct Answer: B
When conducting an investigation related to HR or privacy matters, it’s crucial to handle the process carefully.
Here are some steps to ensure compliance and safeguard privacy:
Privacy and Confidentiality: During investigations, employees have the right to privacy and confidentiality. Information shared during the investigation should only be disclosed on a need-to-know basis. This ensures that sensitive details remain confidential and protects the privacy of all parties involved.
Given the options, B aligns with best practices for maintaining privacy. By ensuring that case details do not include user-identifiable information and restricting access to authorized personnel, you can protect privacy while conducting a thorough investigation.
Which of the following is the first step that should be performed when establishing a disaster recovery plan?
A. Agree on the goals and objectives of the plan
B. Determine the site to be used during a disaster
C. Demonstrate adherence to a standard disaster recovery process
D. Identify applications to be run during a disaster
Correct Answer: A
A. Agree on the goals and objectives of the plan as the first step when establishing a disaster recovery plan (DRP). While conducting a risk analysis is crucial, defining the goals and objectives ensures alignment with business needs and sets the direction for the entire plan. Once you have clear objectives, you can proceed with other essential steps in the DRP process.
A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?
A. Data enrichment
B. Security control plane
C. Threat feed combination
D. Single pane of glass
Correct Answer: D
The security program achieved this improvement by implementing a Single pane of glass approach. By integrating security controls into a SIEM (Security Information and Event Management) system, the analyst no longer needed to switch between multiple tools. This unified view streamlined incident response and reduced Mean Time to Respond (MTTR).