Network flow records show one database server sending large encrypted outbound transfers to an unfamiliar autonomous system during off-hours. Which next step gives the BEST triage value? In the root-cause analysis phase, Which finding would most directly explain the activity?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Distractor review
Delete historical flow records to reduce SIEM cost
Historical telemetry is needed to establish baseline and scope.
Distractor review
Assume encryption means the transfer is safe
Encrypted transport does not prove the destination or activity is legitimate.
Best answer
Correlate flow volume with database audit logs and the destination reputation
Flow data identifies suspicious transfer volume; database audit logs and destination context help determine whether sensitive data may have left.
Distractor review
Disable all outbound internet access for the organisation
A broad outage may be disproportionate before the activity is validated.
Common exam trap
Common exam trap: NAT rules depend on direction and matching traffic
NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.
Technical deep dive
How to think about this question
NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.
KKey Concepts to Remember
- Static NAT maps one inside address to one outside address.
- PAT allows many inside hosts to share one public address using ports.
- Inside local and inside global describe the private and translated addresses.
- NAT ACLs identify traffic for translation, not always security filtering.
TExam Day Tips
- Identify inside and outside interfaces first.
- Check whether the scenario needs static NAT, dynamic NAT or PAT.
- Do not confuse NAT matching ACLs with normal packet-filtering intent.
Related practice questions
Related CS0-003 practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
CompTIA A+ hardware practice questions
Practise CS0-003 questions linked to CompTIA A+ hardware.
CompTIA A+ mobile devices practice questions
Practise CS0-003 questions linked to CompTIA A+ mobile devices.
CompTIA A+ networking practice questions
Practise CS0-003 questions linked to CompTIA A+ networking.
CompTIA A+ operating systems practice questions
Practise CS0-003 questions linked to CompTIA A+ operating systems.
CompTIA A+ security practice questions
Practise CS0-003 questions linked to CompTIA A+ security.
CompTIA A+ software troubleshooting questions
Practise CS0-003 questions linked to CompTIA A+ software troubleshooting questions.
CompTIA A+ operational procedures questions
Practise CS0-003 questions linked to CompTIA A+ operational procedures questions.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A responder is acquiring evidence from a potentially compromised server. Which actions support forensic integrity? (Choose two.)
Question 2
A SOC wants to reduce alert fatigue without missing confirmed malicious activity. Which actions are appropriate? (Choose two.)
Question 3
A user reports approving an unexpected OAuth consent prompt for an app named 'Invoice Reader'. The app now has mailbox read permissions. What should the incident responder do first? During detection and analysis, which decision is most defensible?
Question 4
A business owner accepts delayed remediation for a production system. What must the report include? If the primary audience is business service owner, which content choice is most appropriate?
Question 5
A business owner accepts delayed remediation for a production system. What must the report include? If the primary audience is legal/privacy stakeholder, which content choice is most appropriate?
Question 6
A host alert shows certutil.exe downloading a file from an external URL, followed by execution from a user-writable directory. What should the analyst focus on? In the containment trade-off phase, Which response balances containment with evidence preservation?
FAQ
Questions learners often ask
What does this CS0-003 question test?
Static NAT maps one inside address to one outside address.
What is the correct answer to this question?
The correct answer is: Correlate flow volume with database audit logs and the destination reputation — Flow data identifies suspicious transfer volume; database audit logs and destination context help determine whether sensitive data may have left. This keeps the analysis focused on root-cause analysis rather than broad, low-value actions.
What should I do if I get this CS0-003 question wrong?
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Discussion
Sign in to join the discussion.