Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CS0-003 topic 1 question 33 discussion

Actual exam question from CompTIA's CS0-003
Question #: 33
Topic #: 1
[All CS0-003 Questions]

A new cybersecurity analyst is tasked with creating an executive briefing on possible threats to the organization. Which of the following will produce the data needed for the briefing?

  • A. Firewall logs
  • B. Indicators of compromise
  • C. Risk assessment
  • D. Access control lists
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
crackman123
Highly Voted 5 months, 1 week ago
this clearly state POssible and not already on the sys, all the other options would make sense for a threat already on the sys, but since they are looking for POSSIBLE only risk assessment make sense
upvoted 8 times
...
captaintoadyo
Most Recent 1 week ago
Selected Answer: B
Risk assessment, the threat is not found yet to be discussed, so the analyst has to do a risk assessment first... answer B is incorrect as it nowhere said in the question that the system was attacked before or had indicators of compromise.
upvoted 1 times
...
dave_delete_me
1 week, 3 days ago
Answer is C: Risk Assessments are either Quantitative or Qualitative... the Quantitative portion would be the data to present to your C-Level Executives.
upvoted 1 times
...
zclerge
1 week, 6 days ago
Selected Answer: C
Risk assessment
upvoted 1 times
...
RottenBarracuda
1 month ago
Selected Answer: C
It is definitely risk assesment.
upvoted 1 times
...
CyberJackal
1 month, 1 week ago
Selected Answer: C
Clearly Risk Assessment
upvoted 1 times
...
StillFiguringItOut
1 month, 2 weeks ago
Selected Answer: B
It is asking "which of the following will produce the data" IoC will produce the data for the briefing. A risk assessment analyzes the data for the briefing.. "Produce" is the key word here
upvoted 3 times
...
sujon_london
2 months, 1 week ago
Ans should be c: Risk assessments provide the data needed for executive briefings by summarizing threats, likelihood, impact, and mitigation strategies, directly addressing potential security risks.
upvoted 1 times
...
johnabayot
2 months, 3 weeks ago
Selected Answer: C
Risk assessment
upvoted 1 times
...
FATWENTYSIX
3 months ago
Selected Answer: B
Risk assessments help identify potential hazards. The goal of this process is to determine what measurement should be implemented to mitigate or avoid risks. IOC consists of information gathered about activity, events, and behaviors that are commonly associated with potentially malicious behavior; analysts will look for information that will allow them to detect potential issues or respond to active compromises promptly. IoC feeds provide community information about threats and threat actors such as behavior-based information for threat actors and malware; Domain names used by malware, command-and-control servers, and infected websites, IP addresses, and hostnames associated with malicious actors or active threats. (CySA+ Study Guide 3rd Edition, CS0-003, CHP 10, PG378, OiC).
upvoted 3 times
...
WaaHassan
4 months ago
Selected Answer: B
The best answer is B. Indicators of compromise. Indicators of compromise (IOCs) are pieces of forensic data, such as system files, network traffic, or malicious URLs, that identify potentially malicious activity on a system or network. IOCs can help a cybersecurity analyst detect, prevent, and respond to cyber threats, as well as provide valuable information for the executive briefing.
upvoted 1 times
...
RobV
4 months, 3 weeks ago
Selected Answer: C
C. Risk assessment
upvoted 1 times
...
[Removed]
5 months, 2 weeks ago
Selected Answer: C
Risk assessment. As someone else stated below, this is an administrative/managerial report, not technical. A risk assessment would detail the risk levels and possible threats to the organization.
upvoted 3 times
...
chaddman
6 months, 1 week ago
Selected Answer: C
C. Risk Assessment A Risk Assessment provides a comprehensive view of potential threats, vulnerabilities, and the impact they could have on the organization. It generally includes qualitative and/or quantitative analyses and is designed to give an overview of the organization's security posture, making it most suitable for an executive briefing.
upvoted 2 times
...
kumax
6 months, 4 weeks ago
Selected Answer: C
ChatGPT
upvoted 1 times
...
kmordalv
7 months, 1 week ago
Selected Answer: C
The question refers to executive report no technical report This invalidates any of the technical options: firewall logs (provide technical details), IoCs (specific pieces of information that suggest a security incident or potential breach) and ACL (specify the permissions and restrictions for accessing network resources) On the other hand, "risk assessment" is essential for an executive briefing as it helps senior management make informed decisions about resource allocation and risk mitigation strategies. Therefore, the correct answer is C
upvoted 1 times
...
chrys
7 months, 3 weeks ago
C is correct. Watch out for the key word "possible".
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...