CS0-002 CompTIA CySA+ Online Prep Questions

Posted by: Pdfprep Category: CompTIA Online Questions Tags:

CompTIA CS0-002 exam prep questions are researched and produced by Certification Experts who are constantly using industry experience to produce precise, logical and verified explanations for the answers. You may get questions from different web sites or books, but logic is the key. Our CS0-002 prep questions will provide you with exam questions and verified answers that reflect the actual exam.

Page 1 of 14

1. An analyst is reviewing a list of vulnerabilities, which were reported from a recent vulnerability scan of a Linux server.

Which of the following is MOST likely to be a false positive?

2. A security analyst has been alerted to several emails that snow evidence an employee is planning malicious activities that involve employee Pll on the network before leaving the organization.

The security analysis BEST response would be to coordinate with the legal department and:

3. An organization has not had an incident for several month. The Chief information Security Officer (CISO) wants to move to proactive stance for security investigations.

Which of the following would BEST meet that goal?

4. A security analyst, who is working for a company that utilizes Linux servers, receives the following results from a vulnerability scan:





Which of the following is MOST likely a false positive?

5. CORRECT TEXT

You are a cybersecurity analyst tasked with interpreting scan data from Company A's servers. You must verify the requirements are being met for all of the servers and recommend changes if you find they are not.

The company's hardening guidelines indicate the following:

• TLS 1.2 is the only version of TLS running.

• Apache 2.4.18 or greater should be used.

• Only default ports should be used.



INSTRUCTIONS

Using the supplied data, record the status of compliance with the company's guidelines for each server.

The question contains two parts: make sure you complete Part 1 and Part 2. Make recommendations for issues based ONLY on the hardening guidelines provided.



















6. An organization has several systems that require specific logons Over the past few months,

the security analyst has noticed numerous failed logon attempts followed by password resets.

Which of the following should the analyst do to reduce the occurrence of legitimate failed logons and password resets?

7. The help desk provided a security analyst with a screenshot of a user's desktop:





For which of the following is aircrack-ng being used?

8. A security analyst is reviewing the following requirements (or new time clocks that will be installed in a shipping warehouse:

•. The clocks must be configured so they do not respond to ARP broadcasts.

•. The server must be configured with static ARP entries for each clock.

Which of the following types of attacks will this configuration mitigate?

9. During an investigation, a security analyst identified machines that are infected with malware the antivirus was unable to detect.

Which of the following is the BEST place to acquire evidence to perform data carving?

10. A security analyst conducted a risk assessment on an organization's wireless network and identified a high-risk element in the implementation of data confidentially protection.

Which of the following is the BEST technical security control to mitigate this risk?