CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA CySA+ CS0-003 Practice Question

During a review of the logs, a cybersecurity analyst notices that the data inputs recorded for a machine learning model used in fraud detection exhibit an unusual pattern that significantly deviates from the expected data format and ranges. The anomaly led to a drop in detection accuracy, and subsequent investigations pointed to external manipulation. What type of vulnerability is most likely being exploited in this scenario?

  • Buffer overflow

  • Parameter tampering

  • Data poisoning

  • SQL injection

  • Heap overflow

  • Cross-site request forgery

Subscribe to avoid duplicate questions and track your progress over time
This question is for objective:
Vulnerability Management
Your Score:
Vulnerability Management
Incident Response and Management
Reporting and Communication
Security Operations