Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CS0-001 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is CS0-002

CS0-001 Exam Dumps - CompTIA CySA+ Certification Exam

Go to page:
Question # 9

A recent audit included a vulnerability scan that found critical patches released 60 days prior were not applied to servers in the environment. The infrastructure team was able to isolate the issue and determined it was due to a service being disabled on the server running the automated patch management application. Which of the following would be the MOST efficient way to avoid similar audit findings in the future?

A.

Implement a manual patch management application package to regain greater control over the process.

B.

Create a patch management policy that requires all servers to be patched within 30 days of patch release.

C.

Implement service monitoring to validate that tools are functioning properly.

D.

Set services on the patch management server to automatically run on start-up.

Full Access
Question # 10

Which of the following command line utilities would an analyst use on an end-user PC to determine the ports it is listening on?

A.

tracert

B.

ping

C.

nslookup

D.

netstat

Full Access
Question # 11

A cybersecurity analyst develops a regular expression to find data within traffic that will alarm on a hit.

The SIEM alarms on seeing this data in cleartext between the web server and the database server.

Which of the following types of data would the analyst MOST likely to be concerned with, and to which type of data classification does it belong?

A.

Credit card numbers that are PCI

B.

Social security numbers that are PHI

C.

Credit card numbers that are PII

D.

Social security numbers that are PII

Full Access
Question # 12

The Chief Information Security Officer (CISO) has decided that all accounts with elevated privileges must use a longer, more complicated passphrase instead of a password. The CISO would like to formally document management’s intent to set this control level. Which of the following is the appropriate means to achieve this?

A.

A control

B.

A standard

C.

A policy

D.

A guideline

Full Access
Question # 13

A security analyst performs various types of vulnerability scans.

Review the vulnerability scan results to determine the type of scan that was executed and if a false positive occurred for each device.

Instructions:

Select the Results Generated drop-down option to determine if the results were generated from a credentialed scan, non-credentialed scan, or a compliance scan.

For ONLY the credentialed and non-credentialed scans, evaluate the results for false positives and check the findings that display false positives. NOTE: If you would like to uncheck an option that is currently selected, click on the option a second time.

Lastly, based on the vulnerability scan results, identify the type of Server by dragging the Server to the results.

The Linux Web Server, File-Print Server and Directory Server are draggable.

If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

Full Access
Question # 14

An investigation showed a worm was introduced from an engineer’s laptop. It was determined the company does not provide engineers with company-owned laptops, which would be subject to company policy and technical controls.

Which of the following would be the MOST secure control implement?

A.

Deploy HIDS on all engineer-provided laptops, and put a new router in the management network.

B.

Implement role-based group policies on the management network for client access.

C.

Utilize a jump box that is only allowed to connect to clients from the management network.

D.

Deploy a company-wide approved engineering workstation for management access.

Full Access
Question # 15

During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive. The attacker used those keys to intercept and decrypt sensitive traffic on a web server. Which of the following describes this type of exploit and the potential remediation?

A.

Session hijacking; network intrusion detection sensors

B.

Cross-site scripting; increased encryption key sizes

C.

Man-in-the-middle; well-controlled storage of private keys

D.

Rootkit; controlled storage of public keys

Full Access
Question # 16

The human resources division is moving all of its applications to an IaaS cloud. The Chief Information Officer (CIO) has asked the security architect to design the environment securely to prevent the IaaS provider from accessing its data-at-rest and data-in-transit within the infrastructure. Which of the following security controls should the security architect recommend?

A.

Implement a non-data breach agreement

B.

Ensure all backups are remote outside the control of the IaaS provider

C.

Ensure all of the IaaS provider’s workforce passes stringent background checks

D.

Render data unreadable through the use of appropriate tools and techniques

Full Access
Go to page: