A user opens an invoice document and shortly afterward the endpoint runs wscript.exe from the user's profile. Which detection logic is most relevant? In the containment trade-off phase, Which response balances containment with evidence preservation?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Distractor review
High CPU usage on the print server
Print server CPU does not explain the user's suspicious process chain.
Distractor review
A password expiry warning
Password warnings are unrelated to script execution.
Distractor review
Successful DHCP renewal
DHCP renewal is normal network operation.
Best answer
Office document spawning a script interpreter from a user context
Office-to-script process chains are common initial execution patterns for phishing payloads.
Common exam trap
Common exam trap: NAT rules depend on direction and matching traffic
NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.
Technical deep dive
How to think about this question
NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.
KKey Concepts to Remember
- Static NAT maps one inside address to one outside address.
- PAT allows many inside hosts to share one public address using ports.
- Inside local and inside global describe the private and translated addresses.
- NAT ACLs identify traffic for translation, not always security filtering.
TExam Day Tips
- Identify inside and outside interfaces first.
- Check whether the scenario needs static NAT, dynamic NAT or PAT.
- Do not confuse NAT matching ACLs with normal packet-filtering intent.
Related practice questions
Related CS0-003 practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
CompTIA A+ hardware practice questions
Practise CS0-003 questions linked to CompTIA A+ hardware.
CompTIA A+ mobile devices practice questions
Practise CS0-003 questions linked to CompTIA A+ mobile devices.
CompTIA A+ networking practice questions
Practise CS0-003 questions linked to CompTIA A+ networking.
CompTIA A+ operating systems practice questions
Practise CS0-003 questions linked to CompTIA A+ operating systems.
CompTIA A+ security practice questions
Practise CS0-003 questions linked to CompTIA A+ security.
CompTIA A+ software troubleshooting questions
Practise CS0-003 questions linked to CompTIA A+ software troubleshooting questions.
CompTIA A+ operational procedures questions
Practise CS0-003 questions linked to CompTIA A+ operational procedures questions.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A responder is acquiring evidence from a potentially compromised server. Which actions support forensic integrity? (Choose two.)
Question 2
A SOC wants to reduce alert fatigue without missing confirmed malicious activity. Which actions are appropriate? (Choose two.)
Question 3
A user reports approving an unexpected OAuth consent prompt for an app named 'Invoice Reader'. The app now has mailbox read permissions. What should the incident responder do first? During detection and analysis, which decision is most defensible?
Question 4
A business owner accepts delayed remediation for a production system. What must the report include? If the primary audience is business service owner, which content choice is most appropriate?
Question 5
A business owner accepts delayed remediation for a production system. What must the report include? If the primary audience is legal/privacy stakeholder, which content choice is most appropriate?
Question 6
A host alert shows certutil.exe downloading a file from an external URL, followed by execution from a user-writable directory. What should the analyst focus on? In the containment trade-off phase, Which response balances containment with evidence preservation?
FAQ
Questions learners often ask
What does this CS0-003 question test?
Static NAT maps one inside address to one outside address.
What is the correct answer to this question?
The correct answer is: Office document spawning a script interpreter from a user context — Office-to-script process chains are common initial execution patterns for phishing payloads. This keeps the analysis focused on containment trade-off rather than broad, low-value actions.
What should I do if I get this CS0-003 question wrong?
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Discussion
Sign in to join the discussion.