🎖️🏵️ Memorial Weekend Sale — 30% off🎖️🏵️

CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA CySA+ CS0-003 Practice Question

You are responding to a security breach at a company where attackers have targeted web applications. According to the practices advised in the OWASP Testing Guide, which of the following would be the best initial step to ensure you've secured the necessary data for a thorough analysis of the application vulnerabilities exploited in the attack?

  • Immediately reviewing all account integrity for signs of compromise

  • Examining user behavior patterns for anomalies in application usage

  • Securing and analyzing the web server logs

  • Performing an exhaustive code review on the current web applications

This question is for objective:
Incident Response and Management
Your Score:
Incident Response and Management
Security Operations
Vulnerability Management
Reporting and Communication