Cs0-002 Dumps Comptia Cybersecurity Analyst (Cysa+) Certification Exam
Cs0-002 Dumps Comptia Cybersecurity Analyst (Cysa+) Certification Exam
CS0-002 Dumps
https://www.certleader.com/CS0-002-dumps.html
NEW QUESTION 1
An analyst is participating in the solution analysis process for a cloud-hosted SIEM platform to centralize log monitoring and alerting capabilities in the SOC.
Which of the following is the BEST approach for supply chain assessment when selecting a vendor?
A. Gather information from providers, including datacenter specifications and copies of audit reports.
B. Identify SLA requirements for monitoring and logging.
C. Consult with senior management for recommendations.
D. Perform a proof of concept to identify possible solutions.
Answer: B
NEW QUESTION 2
After receiving reports latency, a security analyst performs an Nmap scan and observes the following output:
Which of the following suggests the system that produced output was compromised?
Answer: B
NEW QUESTION 3
A security analyst needs to reduce the overall attack surface.
Which of the following infrastructure changes should the analyst recommend?
A. Implement a honeypot.
B. Air gap sensitive systems.
C. Increase the network segmentation.
D. Implement a cloud-based architecture.
Answer: C
NEW QUESTION 4
Which of the following should be found within an organization's acceptable use policy?
A. Passwords must be eight characters in length and contain at least one special character.
B. Customer data must be handled properly, stored on company servers, and encrypted when possible
C. Administrator accounts must be audited monthly, and inactive accounts should be removed.
D. Consequences of violating the policy could include discipline up to and including termination.
Answer: D
NEW QUESTION 5
A security administrator needs to create an IDS rule to alert on FTP login attempts by root. Which of the following rules is the BEST solution?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
NEW QUESTION 6
A security analyst has been alerted to several emails that snow evidence an employee is planning malicious activities that involve employee Pll on the network
before leaving the organization. The security analysis BEST response would be to coordinate with the legal department and:
Answer: D
NEW QUESTION 7
A web developer wants to create a new web part within the company website that aggregates sales from individual team sites. A cybersecurity analyst wants to
ensure security measurements are implemented during this process. Which of the following remediation actions should the analyst take to implement a
vulnerability management process?
A. Personnel training
B. Vulnerability scan
C. Change management
D. Sandboxing
Answer: C
NEW QUESTION 8
A security analyst discovered a specific series of IP addresses that are targeting an organization. None of the attacks have been successful. Which of the following
should the security analyst perform NEXT?
Answer: D
NEW QUESTION 9
During a routine log review, a security analyst has found the following commands that cannot be identified from the Bash history log on the root user.
A. Line 1
B. Line 2
C. Line 3
D. Line 4
E. Line 5
F. Line 6
Answer: B
NEW QUESTION 10
It is important to parameterize queries to prevent:
Answer: A
NEW QUESTION 10
You are a cybersecurity analyst tasked with interpreting scan data from Company A's servers. You must verify the requirements are being met for all of the servers
and recommend changes if you find they are not.
The company's hardening guidelines indicate the following:
• TLS 1.2 is the only version of TLS running.
• Apache 2.4.18 or greater should be used.
• Only default ports should be used. INSTRUCTIONS
Using the supplied data, record the status of compliance with the company's guidelines for each server.
The question contains two parts: make sure you complete Part 1 and Part 2. Make recommendations for issues based ONLY on the hardening guidelines
provided.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Part 1 Answer
Check on the following:
AppServ1 is only using TLS.1.2
AppServ4 is only using TLS.1.2
AppServ1 is using Apache 2.4.18 or greater
AppServ3 is using Apache 2.4.18 or greater
AppServ4 is using Apache 2.4.18 or greater
Part 2 Answer
Recommendation:
Recommendation is to disable TLS v1.1 on AppServ2 and AppServ3. Also upgrade AppServ2 Apache to version 2.4.48 from its current version of 2.3.48
NEW QUESTION 11
An organization was alerted to a possible compromise after its proprietary data was found for sale on the Internet. An analyst is reviewing the logs from the next-
generation UTM in an attempt to find evidence of this breach. Given the following output:
A. webserver.org-dmz.org
B. sftp.org-dmz.org
C. 83hht23.org-int.org
D. ftps.bluemed.net
Answer: A
NEW QUESTION 13
A cyber-incident response analyst is investigating a suspected cryptocurrency miner on a company's server. Which of the following is the FIRST step the analyst
should take?
A. Create a full disk image of the server's hard drive to look for the file containing the malware.
B. Run a manual antivirus scan on the machine to look for known malicious software.
C. Take a memory snapshot of the machine to capture volatile information stored in memory.
D. Start packet capturing to look for traffic that could be indicative of command and control from the miner.
Answer: D
NEW QUESTION 18
A compliance officer of a large organization has reviewed the firm's vendor management program but has discovered there are no controls defined to evaluate
third-party risk or hardware source authenticity. The compliance officer wants to gain some level of assurance on a recurring basis regarding the implementation of
controls by third parties.
Which of the following would BEST satisfy the objectives defined by the compliance officer? (Choose two.)
Answer: AC
NEW QUESTION 23
A security team wants to make SaaS solutions accessible from only the corporate campus.
Which of the following would BEST accomplish this goal?
A. Geofencing
B. IP restrictions
C. Reverse proxy
D. Single sign-on
Answer: A
NEW QUESTION 28
A hybrid control is one that:
Answer: B
NEW QUESTION 30
A security analyst reviews the following aggregated output from an Nmap scan and the border firewall ACL:
Which of the following should the analyst reconfigure to BEST reduce organizational risk while maintaining current functionality?
A. PC1
B. PC2
C. Server1
D. Server2
E. Firewall
Answer: B
NEW QUESTION 32
A company just chose a global software company based in Europe to implement a new supply chain management solution. Which of the following would be the
MAIN concern of the company?
Answer: A
NEW QUESTION 33
For machine learning to be applied effectively toward security analysis automation, it requires.
Answer: A
NEW QUESTION 38
A cybersecurity analyst has access to several threat feeds and wants to organize them while simultaneously comparing intelligence against network traffic.
Which of the following would BEST accomplish this goal?
Answer: B
NEW QUESTION 43
The inability to do remote updates of certificates, keys, software, and firmware is a security issue commonly associated with:
Answer: D
NEW QUESTION 46
An organization needs to limit its exposure to accidental disclosure when employees send emails that contain personal information to recipients outside the
company Which of the following technical controls would BEST accomplish this goal?
A. DLP
B. Encryption
C. Data masking
D. SPF
Answer: A
NEW QUESTION 47
The computer incident response team at a multinational company has determined that a breach of sensitive data has occurred in which a threat actor has
compromised the organization’s email system. Per the incident response procedures, this breach requires notifying the board immediately. Which of the following
would be the BEST method of communication?
Answer: C
NEW QUESTION 50
An information security analyst is working with a data owner to identify the appropriate controls to preserve the confidentiality of data within an enterprise
environment One of the primary concerns is exfiltration of data by malicious insiders Which of the following controls is the MOST appropriate to mitigate risks?
A. Data deduplication
B. OS fingerprinting
C. Digital watermarking
D. Data loss prevention
Answer: D
NEW QUESTION 52
A development team signed a contract that requires access to an on-premises physical server. Access must be restricted to authorized users only and cannot be
connected to the Internet.
Which of the following solutions would meet this requirement?
Answer: D
NEW QUESTION 56
While preparing of an audit of information security controls in the environment an analyst outlines a framework control that has the following requirements:
• All sensitive data must be classified
• All sensitive data must be purged on a quarterly basis
• Certificates of disposal must remain on file for at least three years
This framework control is MOST likely classified as:
A. prescriptive
B. risk-based
C. preventive
D. corrective
Answer: A
NEW QUESTION 57
A security analyst is investigating a system compromise. The analyst verities the system was up to date on OS patches at the time of the compromise. Which of
the following describes the type of vulnerability that was MOST likely expiated?
A. Insider threat
B. Buffer overflow
C. Advanced persistent threat
D. Zero day
Answer: D
NEW QUESTION 59
A security analyst is reviewing the logs from an internal chat server. The chat.log file is too large to review manually, so the analyst wants to create a shorter log
file that only includes lines associated with a user demonstrating anomalous activity. Below is a snippet of the log:
Which of the following commands would work BEST to achieve the desired result?
Answer: D
NEW QUESTION 62
An executive assistant wants to onboard a new cloud based product to help with business analytics and dashboarding. When of the following would be the BEST
integration option for the service?
A. Manually log in to the service and upload data files on a regular basis.
B. Have the internal development team script connectivity and file translate to the new service.
C. Create a dedicated SFTP sue and schedule transfers to ensue file transport security
D. Utilize the cloud products API for supported and ongoing integrations
Answer: A
NEW QUESTION 63
A user receives a potentially malicious email that contains spelling errors and a PDF document. A security analyst reviews the email and decides to download the
attachment to a Linux sandbox for review.
Which of the following commands would MOST likely indicate if the email is malicious?
A. sha256sum ~/Desktop/file.pdf
B. file ~/Desktop/file.pdf
C. strings ~/Desktop/file.pdf | grep "<script"
D. cat < ~/Desktop/file.pdf | grep -i .exe
Answer: A
NEW QUESTION 66
A system is experiencing noticeably slow response times, and users are being locked out frequently. An analyst asked for the system security plan and found the
system comprises two servers: an application server in the DMZ and a database server inside the trusted domain. Which of the following should be performed
NEXT to investigate the availability issue?
Answer: C
NEW QUESTION 69
Which of the following types of policies is used to regulate data storage on the network?
A. Password
B. Acceptable use
C. Account management
D. Retention
Answer: D
NEW QUESTION 70
Approximately 100 employees at your company have received a phishing email. As a security analyst you have been tasked with handling this situation.
INSTRUCTIONS
Review the information provided and determine the following:
* 1. How many employees clicked on the link in the phishing email?
* 2. On how many workstations was the malware installed?
* 3. What is the executable file name or the malware?
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Select the following answer as per diagram below:
NEW QUESTION 71
Which of the following policies would slate an employee should not disable security safeguards, such as host firewalls and antivirus on company systems?
Answer: D
NEW QUESTION 75
A security analyst, who is working for a company that utilizes Linux servers, receives the following results from a vulnerability scan:
Answer: B
NEW QUESTION 76
An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the
organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer in operation. The
analyst documents the activities and verifies these actions prevent remote exploitation of the vulnerability.
Which of the following would be the MOST appropriate to remediate the controller?
Answer: A
NEW QUESTION 80
A security analyst working in the SOC recently discovered Balances m which hosts visited a specific set of domains and IPs and became infected with malware.
Which of the following is the MOST appropriate action to take in the situation?
A. implement an IPS signature for the malware and update the blacklisting for the associated domains and IPs
B. Implement an IPS signature for the malware and another signature request to Nock all the associated domains and IPs
C. Implement a change request to the firewall setting to not allow traffic to and from the IPs and domains
D. Implement an IPS signature for the malware and a change request to the firewall setting to not allow traffic to and from the IPs and domains
Answer: C
NEW QUESTION 82
During an investigation, a security analyst identified machines that are infected with malware the antivirus was unable to detect.
Which of the following is the BEST place to acquire evidence to perform data carving?
Answer: A
NEW QUESTION 83
During an investigation, a security analyst determines suspicious activity occurred during the night shift over the weekend. Further investigation reveals the activity
was initiated from an internal IP going to an external website.
Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in the future?
Answer: D
NEW QUESTION 85
A cybersecurity analyst is currently checking a newly deployed server that has an access control list applied. When conducting the scan, the analyst received the
following code snippet of results:
A. The analyst has discovered a False Positive, and the status code is incorrect providing an OK message.
B. The analyst has discovered a True Positive, and the status code is correct providing a file not found error message.
C. The analyst has discovered a True Positive, and the status code is incorrect providing a forbidden message.
D. The analyst has discovered a False Positive, and the status code is incorrect providing a server error message.
Answer: B
NEW QUESTION 86
An incident responder successfully acquired application binaries off a mobile device for later forensic analysis. Which of the following should the analyst do NEXT?
Answer: C
NEW QUESTION 91
A security analyst has received reports of very slow, intermittent access to a public-facing corporate server. Suspecting the system may be compromised, the
analyst runs the following commands:
Based on the output from the above commands, which of the following should the analyst do NEXT to further the investigation?
A. Run crontab -r; rm -rf /tmp/.t to remove and disable the malware on the system.
B. Examine the server logs for further indicators of compromise of a web application.
C. Run kill -9 1325 to bring the load average down so the server is usable again.
D. Perform a binary analysis on the /tmp/.t/t file, as it is likely to be a rogue SSHD server.
Answer: B
NEW QUESTION 95
A security team is implementing a new vulnerability management program in an environment that has a historically poor security posture. The team is aware of
issues patch management in the environment and expects a large number of findings. Which of the following would be the MOST efficient way to increase the
security posture of the organization in the shortest amount of time?
A. Create an SLA stating that remediation actions must occur within 30 days of discovery for all levels of vulnerabilities.
B. Incorporate prioritization levels into the remediation process and address critical findings first.
C. Create classification criteria for data residing on different servers and provide remediation only for servers housing sensitive data.
D. Implement a change control policy that allows the security team to quickly deploy patches in the production environment to reduce the risk of any vulnerabilities
found.
Answer: B
NEW QUESTION 99
A system’s authority to operate (ATO) is set to expire in four days. Because of other activities and limited staffing, the organization has neglected to start
reauthentication activities until now. The cybersecurity group just performed a vulnerability scan with the partial set of results shown below:
Based on the scenario and the output from the vulnerability scan, which of the following should the security team do with this finding?
A. Remediate by going to the web config file, searching for the enforce HTTP validation setting, and manually updating to the correct setting.
B. Accept this risk for now because this is a “high” severity, but testing will require more than the four days available, and the system ATO needs to be competed.
C. Ignore i
D. This is false positive, and the organization needs to focus its efforts on other findings.
E. Ensure HTTP validation is enabled by rebooting the server.
Answer: A
Answer: BD
A. Client-side whitelisting
B. Server-side whitelisting
C. Server-side blacklisting
D. Client-side blacklisting
Answer: B
Which of the following BEST describes the method used by each tool? (Choose two.)
Answer: CE
Answer: A
100% Pass Your CS0-002 Exam with Our Prep Materials Via below:
https://www.certleader.com/CS0-002-dumps.html