exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 67 discussion

Actual exam question from CompTIA's CS0-003
Question #: 67
Topic #: 1
[All CS0-003 Questions]

While reviewing web server logs, an analyst notices several entries with the same time stamps, but all contain odd characters in the request line. Which of the following steps should be taken next?

  • A. Shut the network down immediately and call the next person in the chain of command.
  • B. Determine what attack the odd characters are indicative of.
  • C. Utilize the correct attack framework and determine what the incident response will consist of.
  • D. Notify the local law enforcement for incident response.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
LiveLaughToasterBath
Highly Voted 1 year, 5 months ago
Selected Answer: B
Do we know what the odd characters are indicative of yet? Is this an attack? We need to investigate and determine if this is an incident first before we consult an attack framework.
upvoted 29 times
...
[Removed]
Highly Voted 1 year, 5 months ago
Selected Answer: C
Y'all need to quit using ChatGPT. The correct choice is C. NOT A) You can't just shut down an entire network. It hasn't been confirmed to be malicious. This is not a good containment practice. NOT B) This is part of the incident analysis process. This just tells you what kind of attack it may be. Your attack framework would be able to identify this better (option C). C. Is correct. Your attack response framework (Kill Chain, MITRE, DIAMOND) will guide your response, and from there, you would begin your incident response, which will include option B and D by the way. You don't just willy nilly take whatever response approach you wish to. Your framework will guide your response. NOT D) It's not always necessary if you are not regulated. Also, this part of incident response process. Option C would include this and is a better option.
upvoted 26 times
...
f90ecff
Most Recent 2 weeks, 6 days ago
Selected Answer: B
Analyzing web logs with odd characters often points to a potential injection attack, like SQL injection or cross-site scripting (XSS). Before escalating, it's important to identify the nature of the attack — this helps determine the severity and the proper response. Jumping to actions like shutdowns (A) or law enforcement notification (D) is premature without confirming what’s going on. While C (using a framework like MITRE ATT&CK or the NIST IR process) is a good long-term step, it comes after initial triage and identification.
upvoted 1 times
...
Zayn911
3 months, 1 week ago
Selected Answer: C
B is part of C. Also, this sounds like fuzzing.
upvoted 2 times
...
Wolf541
3 months, 1 week ago
Selected Answer: C
The best choice seems to be C
upvoted 2 times
...
passingtoday
3 months, 3 weeks ago
Selected Answer: B
Option C. Utilize the correct attack framework and determine what the incident response will consist ofis also a valid step in the incident response process. However, before utilizing an attack framework and determining the incident response, it is essential to first identify and understand the nature of the attack. Determining what attack the odd characters are indicative of (Option B) is a more immediate and specific action that helps in identifying the type of attack. Once the attack type is identified, the analyst can then proceed to utilize the appropriate attack framework and determine the incident response plan. In summary, Option B is a more immediate step that leads to Option C. Both steps are important, but identifying the attack type comes first in the sequence of actions.
upvoted 3 times
...
Thanks_stoneface
4 months, 2 weeks ago
Selected Answer: B
Incident response doesn’t make sense, they use the word “odd”, it could be benign activity that the analyst just isn’t familiar with.
upvoted 3 times
...
Learner213
5 months, 1 week ago
Selected Answer: C
Follow the guidelines and the standard operating procedures.
upvoted 2 times
...
wajdi
5 months, 3 weeks ago
the correct response is B; typically, when we have suspicions, we need to investigate further to confirm whether there is a real attack before starting the incident response plan
upvoted 2 times
...
iMo7ed
7 months, 1 week ago
Selected Answer: C
I go for C
upvoted 1 times
...
voiddraco
9 months, 1 week ago
I’d choose B cause how can you determine what incident response will consist of if you don't even know what type of attack it is first? I get why ppl picked C but still
upvoted 1 times
voiddraco
9 months ago
Revised and yeah C is right. they actually discussed this on a podcast and a couple youtube videos.
upvoted 3 times
...
...
cartman_sc
11 months, 3 weeks ago
Selected Answer: C
Essa escolha permite uma abordagem organizada e abrangente, garantindo que o tipo de ataque seja identificado e que os passos apropriados para mitigação e resposta sejam seguidos de acordo com as melhores práticas de segurança.
upvoted 2 times
...
Geronemo
11 months, 4 weeks ago
Selected Answer: C
Honestly, C is the only one that makes logical sense... choose c... trust me, scored an 827 on my exam
upvoted 2 times
...
BanesTech
1 year ago
Selected Answer: B
Analyzing the odd characters in the request line can help determine if they are part of a known attack pattern or if they indicate malicious activity. This step involves investigating the nature of the characters, such as whether they resemble SQL injection attempts, cross-site scripting (XSS) payloads, or other types of injection attacks. Once the nature of the attack is identified, appropriate response actions can be taken, such as implementing security controls to mitigate the attack, blocking malicious IP addresses, or patching vulnerable systems. Options A, C, and D are not suitable as immediate next steps without first understanding the nature and severity of the incident through analysis.
upvoted 1 times
...
cyberwolfhooah
1 year, 2 months ago
Selected Answer: C
...............
upvoted 2 times
...
daddylonglegs
1 year, 3 months ago
Selected Answer: B
How can you determine what incident response will consist of if you don't even know what type of attack it is first, if it is even an attack at all and not just a false positive?
upvoted 3 times
...
RobV
1 year, 4 months ago
Selected Answer: B
B. Determine what attack the odd characters are indicative of. In the context of reviewing web server logs, the most immediate and practical step is to investigate the nature of the odd characters in the request line. This involves understanding the patterns, syntax, and characteristics of these entries to determine if they are indicative of a particular attack or anomaly. Simply shutting down the network (option A) or notifying law enforcement (option D) without understanding the nature of the issue might be premature and could disrupt normal operations unnecessarily. Utilizing the correct attack framework (option C) may come into play after identifying the attack type, but the initial focus should be on understanding the nature of the odd characters to assess the potential threat.
upvoted 3 times
jcm3
1 year, 4 months ago
We get it bro you really love ChatGPT
upvoted 1 times
daddylonglegs
1 year, 3 months ago
Not everyone that disagrees with you is using ChatGPT dude
upvoted 2 times
bettyboo
1 year, 2 months ago
I happen to have a paid subscription of Copyleaks and he is, indeed, using ChatGPT. I just checked his answer on it. Came ALL red.
upvoted 1 times
high_My_name_is
1 year ago
GPTZero backs up this claim
upvoted 1 times
...
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago