Free CompTIA CySA+ CS0-003 Practice Question

During a review of the logs, a cybersecurity analyst notices that the data inputs recorded for a machine learning model used in fraud detection exhibit an unusual pattern that significantly deviates from the expected data format and ranges. The anomaly led to a drop in detection accuracy, and subsequent investigations pointed to external manipulation. What type of vulnerability is most likely being exploited in this scenario?

  • SQL injection

  • Parameter tampering

  • Data poisoning

  • Heap overflow

  • Cross-site request forgery

  • Buffer overflow

This question's topic:
CompTIA CySA+ CS0-003 / 
Vulnerability Management
Your Score:

Check or uncheck an objective to set which questions you will receive.