Vcehome > CompTIA > CompTIA CySA+ > CS0-002 > CS0-002 Online Practice Questions and Answers

CS0-002 Online Practice Questions and Answers

Questions 4

A user receives a potentially malicious email that contains spelling errors and a PDF document. A security analyst reviews the email and decides to download the attachment to a Linux sandbox for review. Which of the following commands would MOST likely indicate if the email is malicious?

A. sha256sum ~/Desktop/file.pdf

B. file ~/Desktop/file.pdf

C. strings ~/Desktop/file.pdf | grep "

D. cat < ~/Desktop/file.pdf | grep -i .exe

Browse 1059 Q&As
Questions 5

The help desk notified a security analyst that emails from a new email server are not being sent out. The new email server was recently added to the existing ones. The analyst runs the following command on the new server:

Given the output, which of the following should the security analyst check NEXT?

A. The DNS name of the new email server

B. The version of SPF that is being used

C. The IP address of the new email server

D. The DMARC policy

Browse 1059 Q&As
Questions 6

While reviewing system logs, a network administrator discovers the following entry:

Which of the following occurred?

A. An attempt was made to access a remote workstation.

B. The PsExec services failed to execute.

C. A remote shell failed to open.

D. A user was trying to download a password file from a remote system.

Browse 1059 Q&As
Questions 7

Which of the following BEST explains the function of a managerial control?

A. To scope the security planning, program development, and maintenance of the security life cycle

B. To guide the development of training, education, security awareness programs, and system maintenance

C. To implement data classification, risk assessments, security control reviews, and contingency planning

D. To ensure tactical design, selection of technology to protect data, logical access reviews, and the implementation of audit trails

Browse 1059 Q&As
Questions 8

A security analyst is correlating, ranking, and enriching raw data into a report that will be interpreted by humans or machines to draw conclusions and create actionable recommendations.

Which of the following steps in the intelligence cycle is the security analyst performing?

A. Analysis and production

B. Processing and exploitation

C. Dissemination and evaluation

D. Data collection

E. Planning and direction

Browse 1059 Q&As
Questions 9

An organization is requesting the development of a disaster recovery plan. The organization has grown and so has its infrastructure. Documentation, policies, and procedures do not exist. Which of the following steps should be taken to assist in the development of the disaster recovery plan?

A. Conduct a risk assessment.

B. Develop a data retention policy.

C. Execute vulnerability scanning.

D. Identify assets.

Browse 1059 Q&As
Questions 10

A cybersecurity analyst is hired to review the security measures implemented within the domain controllers of a company. Upon review, the cybersecurity analyst notices a brute force attack can be launched against domain controllers that run on a Windows platform. The first remediation step implemented by the cybersecurity analyst is to make the account passwords more complex. Which of the following is the NEXT remediation step the cybersecurity analyst needs to implement?

A. Disable the ability to store a LAN manager hash.

B. Deploy a vulnerability scanner tool.

C. Install a different antivirus software.

D. Perform more frequent port scanning.

E. Move administrator accounts to a new security group.

Browse 1059 Q&As
Questions 11

An employee was conducting research on the Internet when a message from cyber criminals appeared on the screen, stating the hard drive was just encrypted by a ransomware variant. An analyst observes the following:

1.

Antivirus signatures were updated recently

2.

The desktop background was changed

3.

Web proxy logs show browsing to various information security sites and ad network traffic

4.

There is a high volume of hard disk activity on the file server

5.

SMTP server shown the employee recently received several emails from blocked senders

6.

The company recently switched web hosting providers

7.

There are several IPS alerts for external port scans

Which of the following describes how the employee got this type of ransomware?

A. The employee fell victim to a CSRF attack

B. The employee was using another user's credentials

C. The employee opened an email attachment

D. The employee updated antivirus signatures

Browse 1059 Q&As
Questions 12

Which of the following session management techniques will help to prevent a session identifier from being stolen via an XSS attack?

A. Ensuring the session identifier length is sufficient

B. Creating proper session identifier entropy

C. Applying a secure attribute on session cookies

D. Utilizing transport layer encryption on all requests

E. Implementing session cookies with the HttpOnly flag

Browse 1059 Q&As
Questions 13

Following a recent security breach, a company decides to investigate account usage to ensure privileged accounts are only being utilized during typical business hours. During the investigation, a security analyst determines an account was consistently utilized in the middle of the night.

Which of the following actions should the analyst take NEXT?

A. Disable the privileged account.

B. Initiate the incident response plan.

C. Report the discrepancy to human resources.

D. Review the activity with the user.

Browse 1059 Q&As
Exam Code: CS0-002
Exam Name: CompTIA Cybersecurity Analyst (CySA+)
Last Update: May 13, 2024
Questions: 1059 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99