Free CompTIA CySA+ CS0-003 Practice Question

You are responding to a security breach at a company where attackers have targeted web applications. According to the practices advised in the OWASP Testing Guide, which of the following would be the best initial step to ensure you've secured the necessary data for a thorough analysis of the application vulnerabilities exploited in the attack?

  • Examining user behavior patterns for anomalies in application usage

  • Securing and analyzing the web server logs

  • Performing an exhaustive code review on the current web applications

  • Immediately reviewing all account integrity for signs of compromise

This question's topic:
CompTIA CySA+ CS0-003 / 
Incident Response and Management
Your Score:

Check or uncheck an objective to set which questions you will receive.