Free CompTIA CySA+ CS0-003 Practice Question

As a cybersecurity analyst conducting a vulnerability assessment, you have identified a service running on a server that appears to be communicating with known malicious IP addresses. Further investigation suggests that this service could be exploited to gain unauthorized access to system resources or sensitive data. Which of the following attack vectors is most likely being exploited in this situation?

  • Supply chain attack

  • USB drop attack

  • Service Exploitation

  • Watering hole attack

This question's topic:
CompTIA CySA+ CS0-003 / 
Vulnerability Management
Your Score:

Check or uncheck an objective to set which questions you will receive.