Search
Close this search box.

Domain 3
CompTIA CySA+ Incident Response & Management | Free Practice + Anki Decks

Ref:📕CompTIA CySA+ Study Guide: Exam CS0-003 (Sybex Study Guide) 3rd Edition

CySA+ (CS0-003) – Domain 3 – Incident Response and Management

1 / 68

What is the purpose of isolating attackers in a sandbox environment?

2 / 68

Which of the following is NOT a recommended action for improving the effectiveness of incident analysis according to NIST 800-61?

3 / 68

Why are attack frameworks useful according to the CompTIA CySA+ study guide?

4 / 68

What criteria does NIST recommend to develop an appropriate containment strategy during an incident response?

5 / 68

Which of the following is a typical indicator of compromise (IoC) that involves networking?

6 / 68

What is an important aspect while gathering and handling evidence during the incident response containment phase?

7 / 68

What are the stages included in ATT&CK matrices to represent the complete threat lifecycle?

8 / 68

What activities are undertaken during the post-incident activity phase of incident response?

9 / 68

According to the National Institute for Standards and Technology (NIST), which of the following is NOT classified as a security incident?

10 / 68

What specific role does an independent facilitator serve during a Lessons Learned Review?

11 / 68

What key elements should an incident response policy contain according to NIST recommendations?

12 / 68

What is the main objective of post-incident activity in cybersecurity?

13 / 68

What are the three key measures used in the incident severity assessment according to the NIST guidelines?

14 / 68

According to the NIST Computer Security Incident Handling Guide, what does it suggest about identifying an attacking host?

15 / 68

What is the strongest containment technique in the cybersecurity analyst’s incident response toolkit?

16 / 68

Which of the following attack vectors is associated with using brute-force methods to compromise, degrade, or destroy systems, networks, or services as described by NIST?

17 / 68

What are commonly used intrusion detection systems for monitoring file system modifications?

18 / 68

How should a CSIRT classify each incident that occurs?

19 / 68

What are some considerations when deciding to retain an incident response provider?

20 / 68

What are some key functions and objectives of a lessons learned session following a cybersecurity incident?

21 / 68

What are some of the important elements that should be covered in a post-incident report written by the CSIRT?

22 / 68

What are the three options for the secure disposition of media containing sensitive information according to NIST?

23 / 68

Which of the following best describes the importance of combining IoCs in identifying a compromise?

24 / 68

How can increases in resource usage indicate potential compromise?

25 / 68

What can make distributed DoS attacks difficult to identify and stop?

26 / 68

Why is it important for a cybersecurity analyst to perform root cause analysis in the aftermath of a security incident?

27 / 68

What is the purpose of a ’Legal Hold’?

28 / 68

What is the primary purpose of network segmentation in cybersecurity?

29 / 68

What is ’impossible travel’ IoC?

30 / 68

What technique does NIST’s hypothetical attacker use to identify when their compromised system has been removed from the network?

31 / 68

The Diamond Model of Intrusion Analysis includes several specific terms. Which one of the following is not a term used in this analysis model?

32 / 68

What is the focus of defense against the Exploitation stage in Lockheed Martin’s Cyber Kill Chain?

33 / 68

Which roles are typically represented on a Cybersecurity Incident Response Team (CSIRT)?

34 / 68

What is a common technique used by attackers to conceal their activities and evade detection?

35 / 68

What are the two primary isolation techniques used during a cybersecurity incident response effort?

36 / 68

What is the importance of testing the Incident Response Plan (IRP)?

37 / 68

Why should responders refer back to the change control and configuration management processes after an incident?

38 / 68

In the incident recovery effort, what is the recommended approach for patching systems and applications?

39 / 68

What is the purpose of Chain of Custody in incident response activities?

40 / 68

What is involved in the preparation phase of setting up a CSIRT?

41 / 68

Which of the following is NOT typically within the scope of the CSIRT as defined by the organization’s incident response policy?

42 / 68

Why is it not sufficient to merely correct the identified security issue in a compromised system?

43 / 68

What criticism has Lockheed Martin’s Cyber Kill Chain model received?

44 / 68

What is one purpose of maintaining a chain-of-custody of evidence during incident response activities?

45 / 68

Which of the following accurately describes the process that should be followed regarding evidence after an incident is concluded?

46 / 68

What is a characteristic of unusual DNS traffic that an organization may monitor?

47 / 68

What do Indicators of Compromise (IoCs) consist of?

48 / 68

What should not be included in the incident response policy?

49 / 68

What are the objectives of the containment, eradication, and recovery phase in incident response?

50 / 68

What is the objective of isolating affected systems in a network?

51 / 68

What is the purpose of validating data integrity during preservation activities?

52 / 68

What are the post-incident activities a CSIRT team should perform after immediate, urgent actions of containment, eradication, and recovery are complete?

53 / 68

According to the NIST, what four data impact categories should cybersecurity analysts consider?

54 / 68

What is the first step in the Containment, Eradication, and Recovery phase of incident response?

55 / 68

What should a CSIRT team do if they believe the evidence they’ve gathered may be used in court?

56 / 68

What are the two testing resources that you must know for the CySA+ exam?

57 / 68

Which of the following measures are used to determine the severity of a security incident?

58 / 68

What is the functional impact of a security incident?

59 / 68

What are the four activities that should always be included in the incident recovery validation effort?

60 / 68

Which of the following is NOT one of the common examples of behavior-based Indicators of Compromise (IoC)?

61 / 68

Which of the following correctly describes the term ’Scope of Impact’ in relation to incident response?

62 / 68

Why do incident response processes have loops that allow responders to return to prior phases during response to a cybersecurity incident?

63 / 68

What should be given focus when documenting the incident response plan?

64 / 68

What is the Unified Kill Chain?

65 / 68

What is the function of a Chain-of-Custody in evidence acquisition and preservation during incident response activities?

66 / 68

What is the primary purpose of the eradication phase while responding to a cybersecurity incident?

67 / 68

What is the purpose of playbooks developed by CSIRT teams?

68 / 68

What is the primary responsibility of IT managers and senior leadership in incident response efforts?

Your score is

Share the Post:

Fill up to receive the FREE CompTIA CySA+ deck!

* indicates required

CompTIA CySA+ Domain 3: Incident Response and Management

For those looking to enhance their career in security or transition into IT, we offer a free practice test for CompTIA CySA+ Domain 3: Incident Response and Management. This test is designed to mirror the actual exam format, boosting your confidence and readiness.

Explore Other CompTIA CySA+ Domains

Key Features

  • Realistic Exam Simulation: Familiarize yourself with the actual exam environment.
  • Detailed Explanations: Learn from comprehensive explanations for each question.
  • Identify Weak Areas: Focus your study on areas that need improvement.
  • Completely Free: Access our high-quality practice test at no cost.

Why Choose Our Practice Test?

  • Expertly Crafted: Developed by experienced cybersecurity professionals.
  • Career Advancement: Passing the CompTIA CySA+ can open new job opportunities.
  • Convenient and Accessible: No registration required, available online anytime. Also, download the Free Offline Deck for Anki app use.
Master Incident Response and Management for the CompTIA CySA+ (CS0-003) exam with our free practice test. Start enhancing your cybersecurity skills today! For more information on CompTIA CySA+ certification, visit the Official Site.

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]